Search Results - "2024 21st International Joint Conference on Computer Science and Software Engineering (JCSSE)"

Refine Results
  1. 1

    Message from the Chair of IEEE Computer Society Thailand Chapter by Chinnasarn, Krisana

    “…On behalf of the IEEE Computer Society Thailand Chapter, I extend a warm welcome to all attendees of the 2024 - 21st Joint Conference on Computer Science and…”
    Get full text
    Conference Proceeding
  2. 2

    Message from General Chair by Nanthaamornphong, Aziz

    “…On behalf of the JCSSE 2024 organizing committee, I am delighted to welcome you to Phuket for the 21st International Joint Conference on Computer Science and…”
    Get full text
    Conference Proceeding
  3. 3

    Policy GRU-RL: Simplified Music Playlist Recommendation U sing Sequential on Reinforcement Learning Concept by Chanarong, Chanapa, Maneeroj, Saranya

    “…In the realm of streaming services, recommendation systems play a crucial role in meeting user preferences by aiding them in discovering music tailored to…”
    Get full text
    Conference Proceeding
  4. 4

    Electromyography-Based Hand Pose Estimation U sing Machine Learning by Wichai, Teerasak, Chukamlang, Ratthathammanoon, Massagram, Wansuree

    “…This paper presents an approach to hand pose estimation using Electromyography (EMG) signals with machine learning techniques. Long Short-Term Memory (LSTM)…”
    Get full text
    Conference Proceeding
  5. 5

    Welcome Message from the President of Prince of Songkla University by Keawpradub, Niwat

    “…On behalf of Prince of Songkla University (PSU), I would like to invite you to The 21st International Joint Conferenc on Computer Science and Software…”
    Get full text
    Conference Proceeding
  6. 6

    AI-empowered Pose Reconstruction for Real-time Synthesis of Remote Metaverse Avatars by Gu, Xingci, Yuan, Ye, Yang, Jianjun, Li, Longjiang

    “…The Metaverse, a synergistic blend of physical and virtual realities, is rapidly evolving as a hub for digital twins and digital avatars, offering…”
    Get full text
    Conference Proceeding
  7. 7

    YOLO for Small Objects in Aerial Imagery: A Performance Evaluation by Saenprasert, Wimonthip, Tun, Ei Ei, Hajian, Amir, Ruangsang, Watchara, Aramvith, Supavadee

    “…Unmanned aerial vehicles (UAVs) offer significant advantages in accessing remote or high-risk locations. Yet, they also present challenges concerning privacy…”
    Get full text
    Conference Proceeding
  8. 8

    Hybrid Machine Learning Approach for Microclimate Prediction in Equipment-Operated Open Ventilated Greenhouse by Maung Thwin, Kyaw Maung, Phatrapornnant, Teera, Horanont, Teerayut, Thepsilvisut, Ornprapa, Hung, Nguyen Duy

    “…A proposed hybrid model did the assessment on microclimate prediction with high fluctuations of indoor temperature and humidity in equipment-operated…”
    Get full text
    Conference Proceeding
  9. 9

    Leak Signal Collection and Classification in Water Pipelines Using Resource-Constrained Devices by Chantarachote, Ratchapol, Charuwimolkul, Natchapol, Jaikaeo, Chaiporn, Pornprommin, Adichai

    “…Water leakage poses a critical threat to water distribution systems. This research addresses leak detection by investigating the correlation between acoustic…”
    Get full text
    Conference Proceeding
  10. 10

    Analyzing Machine Learning Techniques for Air Passenger Numbers Forecasting by Khumla, Pornsiri, Sarawan, Kamthorn, Polpinij, Jantima, Gonwirat, Sarayut, Chantima, Phoori, Sommool, Worapot

    “…The imperative of forecasting air passenger numbers is underscored by its utility in strategic planning and operational optimization within the aviation…”
    Get full text
    Conference Proceeding
  11. 11

    Thai Question Text-To-SQL Parsing Using Transformer by Tungruethaipak, Natthawat, Prom-on, Santitham

    “…This paper introduces a novel approach for trans-lating Thai natural language utterances into Structured Query Language (SQL) and establishes a baseline in…”
    Get full text
    Conference Proceeding
  12. 12

    A Framework for Automatic Root Cause Analysis of Network Failure on MPLS Network by Wankvar, Tikumporn, Witayangkurn, Apichon

    “…The topology and connectivity of Multiprotocol Label Switching Virtual Private Networks (MPLS VPNs) are highly complex, making it challenging to investigate…”
    Get full text
    Conference Proceeding
  13. 13

    Lateralizing Seizure Onset Zone Through Interictal Sleep Scalp EEG High-Frequency Oscillations by Achar, Dhruva P, Kotegar, Karunakar A, Radhakrishnan, Kurupath

    “…Epilepsy, a neurological disorder impacting an estimated 50 million people globally, sees about 30% of patients developing drug-resistant epilepsy (DRE). For…”
    Get full text
    Conference Proceeding
  14. 14

    Loan Applicant Anomaly Detection by Maming, Nurhuda, Chaimontree, Santhana, Lim, Apiradee

    “…Anomaly detection, also known as outlier detection, involves identifying data points or patterns that deviate significantly from the expected or "normal"…”
    Get full text
    Conference Proceeding
  15. 15

    Regularized Linear Fractional Programming for Implementing Digital Phase Compensators by Deng, Tian-Bo

    “…This paper describes a novel methodology for implementing allpass digital phase compensator (DPC) using the generalized linear-fractional programming (LFP)…”
    Get full text
    Conference Proceeding
  16. 16

    Comparison of Deep Learning-based Models for Oral Disease Detection by Thongsakul, Peeranat, Paing, May Phu

    “…Background: In contemporary dentistry, oral object detection is essential for a variety of uses, including automated dental caries diagnosis and orthodontic…”
    Get full text
    Conference Proceeding
  17. 17

    uitPEclaFL: A Study on PE Malware Classification Using Federated Learning by Thinh, Nguyen Vuong, Cam, Nguyen Tan, Huy, Trinh Gia

    “…Malicious software has been posing a considerable threat in cybersecurity. Although, current machine learning approaches have demonstrated their great value in…”
    Get full text
    Conference Proceeding
  18. 18

    3D Mapping of Quadcopters Using Stereo Cameras for Indoor Environment by Nitisatyothin, Satsawat, Pengwang, Eakkachai

    “…This research involves creating a 3D mapping using technology of stereo camera, utilizing a total of 3 quadcopters equipped with three Raspberry Pi boards…”
    Get full text
    Conference Proceeding
  19. 19

    Enhancing Hate Speech Classification in Myanmar Language through Lexicon-Based Filtering by Kyaw, Nang Aeindray, Thu, Ye Kyaw, Oo, Thazin Myint, Chanlekha, Hutchatai, Okumura, Manabu, Supnithi, Thepchai

    “…Detecting hate speech in low-resource languages, like Myanmar, is a critical yet challenging task due to limited linguistic resources. In this study, we…”
    Get full text
    Conference Proceeding
  20. 20

    Detection of a Real Thai National ID Card in Video Based by Keereena, Aniwat, Sinthupinyo, Sukree

    “…Identity verification isam andatory process when applying for various online services in Thailand. It requires presentation of your national ID card as…”
    Get full text
    Conference Proceeding