Wattana Viriyasitavat

ORCID: 0000-0001-7247-4596
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Service-Oriented Architecture and Web Services
  • Business Process Modeling and Analysis
  • Cloud Data Security Solutions
  • Cloud Computing and Resource Management
  • Digital Transformation in Industry
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Multi-Criteria Decision Making
  • Fuzzy Systems and Optimization
  • Network Security and Intrusion Detection
  • Software System Performance and Reliability
  • Semantic Web and Ontologies
  • Optimization and Mathematical Programming
  • Artificial Intelligence in Healthcare
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Data Security
  • COVID-19 diagnosis using AI
  • Smart Agriculture and AI
  • Advanced Software Engineering Methodologies
  • Smart Systems and Machine Learning
  • Advanced Neural Network Applications
  • Anomaly Detection Techniques and Applications
  • Radiomics and Machine Learning in Medical Imaging

Chulalongkorn University
2014-2024

University of Oxford
2010-2012

10.1016/j.jii.2018.07.004 article EN Journal of Industrial Information Integration 2018-07-29

In addition to functionalities, business process management (BPM) involves several key indicators such as openness, security, flexibility, and scalability. Optimizing system performance is becoming a great challenge for an ever-increasing large-scale distributed application in the digital economy on Internet of Things (IoT) era. centralized BPM, many indicators, security or cost are conflicting with each other. For example, inviting new partners across enterprises, domains, regions form...

10.1109/tcss.2019.2919325 article EN IEEE Transactions on Computational Social Systems 2019-06-25

Internet of Things (IoT) refers to networks with billions physical devices for collecting, sharing, and utilizing data in the virtual world. Most IoT applications centralize security assurance creating, authenticating, transferring, or delating system components. However, centralization exposes its limitations meet needs a rapidly growing number things world-widely. How scale up assured becomes critical challenge. Blockchain technology (BCT) is promising solution provide protect privacy...

10.1109/jiot.2019.2925825 article EN IEEE Internet of Things Journal 2019-07-12

As 5G and other technologies are widely used in the Internet of Vehicles, intrusion detection plays an increasingly important role as a vital tool for information security. However, due to rapid changes structure large data flow, complex diverse forms intrusion, traditional methods cannot ensure their accuracy real-time requirements be directly applied Vehicles. A new AA distributed combined deep learning method Vehicles based on Apache Spark framework is proposed response these problems....

10.1155/2022/3424819 article EN Mathematical Problems in Engineering 2022-03-19

Innovating business processes involves cutting-edge technologies where the Internet of Things (IoT) and Blockchain are technological breakthroughs. IoT is envisioned as a global network infrastructure consisting numerous connected devices over Internet. Many attempts have been made to improve adapt workflows for best utilizing services. One possible solution digitize automate internal using services, in which smart contract viable establish trust process executions without intermediaries....

10.1109/tcss.2019.2913165 article EN IEEE Transactions on Computational Social Systems 2019-05-25

This paper presents a requirement-oriented automated framework for formal verification of service workflows. It is based on our previous work describing the workflow specification language called SWSpec. has been developed to facilitate composer as well arbitrary services willing participate in formally and uniformly impose their own requirements. As such, SWSpec provides way regulate control The key component to-be-proposed centers algorithms that rely propositional logic. We demonstrate...

10.1109/tii.2012.2187908 article EN IEEE Transactions on Industrial Informatics 2012-02-14

Internet of Things (IoT) is able to integrate the computation and physical processes as services in social world. The number at edge IoT rising rapidly due prevalent uses smart devices cyber-physical systems (CPSs). To explore promising applications services, one challenges enable interoperability a decentralized environment. blockchain technology (BCT) has been proven solution establish trust data call for executions; theoretically, it can be used support services. BCT verifies or process...

10.1109/tcss.2019.2924442 article EN IEEE Transactions on Computational Social Systems 2019-07-16

The popularization of electronic clinical medical records makes it possible to use automated methods extract high-value information from quickly. As essential information, oncology events are composed attributes that describe malignant tumors. In recent years, medicine event extraction has become a research hotspot in academia. Many academic conferences publish as an evaluation task and provide series high-quality annotation data. This article aims at the characteristics discrete...

10.3390/su14031447 article EN Sustainability 2022-01-27

The benefits and drawbacks of various technologies, as well the scope their application, are thoroughly discussed. use anonymity technology differential privacy in data collection can aid prevention attacks based on background knowledge gleaned from integration fusion. majority medical big stored a cloud computing platform during storage stage. To ensure confidentiality integrity information stored, encryption auditing procedures frequently used. Access control mechanisms mostly used sharing...

10.3390/su14052500 article EN Sustainability 2022-02-22

Tuberculosis (TB) is an airborne disease caused by Mycobacterium tuberculosis. It imperative to detect cases of TB as early possible because if left untreated, there a 70% chance patient dying within 10 years. The necessity for supplementary tools has increased in mid low-income countries due the rise automation healthcare sectors. already limited resources are being heavily allocated towards controlling other dangerous diseases. Modern digital radiography (DR) machines, used screening chest...

10.1155/2022/2399428 article EN Computational Intelligence and Neuroscience 2022-10-03

Saffron, one of the most expensive crops on earth, having a vast domain applications, has potential to boost economy India. The cultivation saffron been immensely affected in past few years due changing climate. Despite use different artificial methods for cultivation, hydroponic approaches using IoT prove give best results. presented study consists used and selection hydroponics as approach out these based parameters. This paper also provides comparative analysis six present approaches....

10.3390/su14031120 article EN Sustainability 2022-01-19

Abstract Detecting brain tumours is complex due to the natural variation in their location, shape, and intensity images. While having accurate detection segmentation of would be beneficial, current methods still need solve this problem despite numerous available approaches. Precise analysis Magnetic Resonance Imaging (MRI) crucial for detecting, segmenting, classifying medical diagnostics. a vital component diagnosis, it requires precise, efficient, careful, reliable image techniques. The...

10.1049/cit2.12276 article EN cc-by CAAI Transactions on Intelligence Technology 2024-01-04

Advanced technologies have changed the nature of business processes in form services. In coordinating services to achieve a particular objective, service workflow is used control composition, execution sequences as well path selection. Since existing mechanisms are insufficient for addressing diversity and dynamicity requirements large-scale distributed environment, developing formal specification necessary. this paper, we propose Service Workflow Specification language, called SWSpec, which...

10.1109/tii.2011.2182519 article EN IEEE Transactions on Industrial Informatics 2012-01-04
Coming Soon ...