Chakchai So–In

ORCID: 0000-0003-1026-191X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • Advanced Wireless Communication Technologies
  • Advanced Wireless Network Optimization
  • Indoor and Outdoor Localization Technologies
  • Advanced MIMO Systems Optimization
  • Wireless Communication Security Techniques
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • UAV Applications and Optimization
  • Underwater Vehicles and Communication Systems
  • IoT and Edge/Fog Computing
  • Security in Wireless Sensor Networks
  • Wireless Communication Networks Research
  • Face and Expression Recognition
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • Caching and Content Delivery
  • Wireless Body Area Networks
  • Image and Video Quality Assessment
  • Machine Learning and ELM
  • Cooperative Communication and Network Coding
  • Software-Defined Networks and 5G
  • Video Coding and Compression Technologies

Khon Kaen University
2015-2024

Burapha University
2021

ORCID
2019

Taiwan Semiconductor Manufacturing Company (Taiwan)
2014

Washington University in St. Louis
2008-2012

IBM Research - India
2009

Interest in broadband wireless access (BWA) has been growing due to increased user mobility and the need for data at all times. IEEE 802.16e based WiMAX networks promise best available quality of experience mobile service users. Unlike LANs, incorporate several (QoS) mechanisms Media Access Control (MAC) level guaranteed services data, voice video. The problem assuring QoS is basically that how allocate resources among users order meet criteria such as delay, delay jitter throughput...

10.1109/jsac.2009.090207 article EN IEEE Journal on Selected Areas in Communications 2009-02-01

The explosive rise of intelligent devices with ubiquitous connectivity have dramatically increased Internet Things (IoT) traffic in the cloud environment and created potential attack surfaces for cyber-attacks. Traditional security approaches are insufficient inefficient to address threats cloud-based IoT networks. In this vein, software defined networking (SDN), network function virtualization (NFV), machine learning techniques introduce numerous advantages that can effectively resolve...

10.1109/access.2019.2932438 article EN cc-by IEEE Access 2019-01-01

This paper proposes a novel traffic monitoring framework, namely, DeepMonitor, for SDN-based IoT networks to provide fine-grained analysis capability different types at the network edges. Specifically, we first develop an intelligent flow rule match-field control system, called DeepMonitor agent, edge nodes, taking granularity-level requirements and their maximum flow-table capacity into consideration. We then formulate optimization problem each node employing Markov decision process (MDP)....

10.1109/tccn.2021.3102971 article EN IEEE Transactions on Cognitive Communications and Networking 2021-08-06

We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the are explained and methods to reduce these also presented. The advantage model is effect each decision sensitivity various parameters can be seen easily. illustrate by estimating three sample applications—Mobile TV, VoIP, data. analysis process helps explain features WiMAX. It shown proper use overhead reducing mechanisms scheduling make an order magnitude...

10.1155/2010/279807 article EN cc-by Journal of Computer Systems Networks and Communications 2010-01-01

Android-based mobile devices have attracted a large number of users because they are easy to use and possess wide range capabilities. Because its popularity, Android has become one the most important platforms for attackers launch their nefarious schemes. Due rising sophistication malware obfuscation detection avoidance tactics, many traditional approaches impractical due limited representation Inspired by success deep learning in learning, this article presents an effective improved neural...

10.1109/jiot.2022.3194881 article EN IEEE Internet of Things Journal 2022-07-29

In this paper, we study the system performance of mobile edge computing (MEC) wireless sensor networks (WSNs) using a multiantenna access point (AP) and two clusters based on uplink nonorthogonal multiple (NOMA). Due to limited computation energy resources, cluster heads (CHs) offload their tasks AP over Nakagami-m fading. We proposed combination protocol for NOMA-MEC-WSNs in which selects either selection combining (SC) or maximal ratio (MRC) each CH participate communication process by...

10.1109/jas.2022.105461 article EN IEEE/CAA Journal of Automatica Sinica 2022-03-09

The broadcast nature of energy harvesting wireless sensor networks (EH-WSNs) allows nodes (SNs) within the coverage range a transmitter to capture its signals. However, an EH-WSN is vulnerable eavesdropping and signal interception; therefore, security in EH-WSNs significant interest, this issue has been addressed over many years. no work studied existence friendly jammer mitigate impact. Thus, paper proposes model optimization scheme that uses wirelessly powered improve secrecy EH-WSNs....

10.1109/access.2017.2768443 article EN cc-by-nc-nd IEEE Access 2017-01-01

In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network the presence of multiple eavesdroppers (EAVs). Specifically, source and relays harvest from power transfer stations (PTSs), then, uses harvested to transmit information base station (BS) with help relays. During transmission information, BS typically faces risk losing due EAVs. Thus, enhance secrecy considered system, one acts as jammer, using generate interference We propose...

10.1109/access.2018.2829485 article EN cc-by-nc-nd IEEE Access 2018-01-01

Due to their low cost, various range-free localization techniques are widely applied estimate device locations in wireless sensor networks (WSNs), especially where other communication signals, such as those from a global positioning system, absent. Among techniques, the centroid algorithm has gained popularity because of its simplicity and computational rendering it suitable for power-sensitive nodes or nodes. WSN topologies unpredictable often deployed at arbitrary locations, making...

10.1109/jiot.2018.2811741 article EN IEEE Internet of Things Journal 2018-03-05

Mobile WiMAX systems based on the IEEE 802.16e standard require all downlink allocations to be mapped a rectangular region in two dimensional subcarrier-time map. Many published resource allocation schemes ignore this requirement. It is possible that when regions may exceed capacity of frame, and QoS some flows violated. The rectangle mapping problem variation bin or strip packing problem, which known NP-complete. In previous paper, an algorithm called OCSA (One Column Striping with...

10.1109/wd.2009.5449676 article EN 2009-12-01

WiMAX has attracted a lot of attention recently in the telecommunication community including researchers, product developers, and service providers. Numerous papers have been published on various design issues networks. Since being discussed are usually ahead availability, most these studies require simulation. It is important to some common features among models so that their results can be compared. Therefore, Application Working Group Forum developed standard simulation methodology...

10.1109/mwc.2008.4653135 article EN IEEE Wireless Communications 2008-10-01

Many challenges to the Internet including global routing scalability have drawn significant attention from both industry and academia, generated several new ideas for next generation. MILSA (Mobility Multihoming supporting Identifier Locator Split Architecture) related enhancements are designed address naming, addressing, challenges, provide mobility multihoming support, easy transition current Internet. In this paper, we synthesize our research into a multiple-tier realm-based framework...

10.1109/jsac.2010.101012 article EN IEEE Journal on Selected Areas in Communications 2010-09-29

Energy efficiency in data collection and transmission is always a crucial factor wireless sensor networks (WSN). Thus, minimizing energy dissipation maximizing network life-time are key factors the design of routing protocols for WSNs. In this paper, based on Low Adaptive Clustering Hierarchy (LEACH) protocols, we propose two new distance-based clustering which call DB-LEACH DBEA-LEACH. The first approach (distance-based) selects cluster head node by considering geometric distance between...

10.1109/icsec.2014.6978125 article EN 2014-07-01

This paper studies unmanned aerial vehicle (UAV)-aided nonorthogonal multiple access (NOMA)-based mobile-edge computing (MEC) in Internet of Things (IoT) systems which the uav acts as a relay (UR). Specifically, we consider scenario with two clusters IoT devices (IDs) (i.e., high-priority cluster IA and low-priority IB) limited resources, so these IDs cannot compute their tasks must offload them to base station (BS) through UR. We propose protocol named time switching - radio frequency (RF)...

10.1109/access.2022.3150046 article EN cc-by IEEE Access 2022-01-01

The key to proper resource allocation for mobile video on wireless networks is have a good model the demands. In this paper, we present results of analysis number streams and show that simple seasonal ARIMA (SAM) can provide very representation both MPEG4-Part2 MPEG4-Part10 videos, formats are commonly used videos. has been implemented frame RTP packet generators. be represent different movies easily adjusted produce workloads simulation studies. We use SAM generator compare performance...

10.1109/jsac.2010.100407 article EN IEEE Journal on Selected Areas in Communications 2010-03-24
Coming Soon ...