Urachada Ketprom

  • Citations Per Year
Learn More
Since the first outbreak of avian flu, the ability to discover the origin of the disease as soon as possible is highly required. To trace back to the origin, it is necessary to identify and verify the source of information. Radio Frequency Identification or RFID is a popular tool to identify animal and automatically collect information for traceability(More)
We present a numerical technique to simulate the propagation characteristics of an on-off-keyed modulated optical signal through fog. The on-off-keyed modulated light (a square wave) is decomposed into a finite number of harmonic components, and a numerical solution for the vector radiative transfer equation is obtained for each harmonic that corresponds to(More)
We have studied the polarization characteristics of light scattered from randomly distributed spherical particles using the 4x4 Mueller matrix. The experimental system consists of a Helium-Neon laser, polarizers (vertical, horizontal, 45-degree linear, left-hand circular) and six analyzers (vertical, horizontal, 45-degree linear, 135-degree linear,(More)
Web-service application has become more important for sharing information among organizations. In this paper, we proposed Web-service application for poultry traceability system. The traceability system is required for identification and verification of the products. The system architecture and algorithm are presented in two different models depending on(More)
An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified. We are interested in the case where two tags are needed to be simultaneously scanned in a readerpsilas field, for which many protocols have been proposed in literature. They however are all insecure for the special(More)
A collision occurs when more than two tags present in the readerpsilas field of a radio frequency identification system. Anti-collision algorithms such as binary trees and dynamic framed slotted aloha (DFSA) have been employed to prevent such a collision. The identification number of tag consists of 64 bits and certain parts of 64 bits can be considered a(More)
In a radio frequency identification (RFID) system, when more than one tag communicates with a reader at the same time, a collision will occur resulting in the failure of that communication. Many anti-collision algorithms, such as Binary Tree (BT), FSA, and DFSA have been used in ISO and EPC standards to prevent such a collision. This paper develops a new(More)
Disk cloner is a device for duplicating or creating a bit-by-bit copy of a hard disk. The current methodology for cloning a large disk is inefficient which results in a very slow speed of such a cloning process. The program called dd is often used for this duplication purpose. The cloning speed depends on both hardware and software. This paper aims to(More)
When more than two tags respond to a reader request at same time slot, the tag collision occurs. This is one of disadvantages in radio frequency identification (RFID) system. The performance of anti-collision algorithms is important to overcome this problem. In this paper, the performance of dynamic framed slotted ALOHA (DFSA) is studied. The DFSA with mute(More)
Sensor is one of the popular devices used in many applications nowadays including the intelligent transportation system (ITS) which is widely utilized in the automatic vehicle identification (AVI) system. In this research, we propose an implementation of photoelectric sensors as a vehicle detection tool in an RFID-based poultry traceability system to detect(More)