Papers by Chetneti Srisa-An
The effect of data anonymization on a data science project
2022 6th International Conference on Information Technology (InCIT)
Guideline for Data Anonymization for Data Privacy in Thailand
2022 6th International Conference on Information Technology (InCIT)
International Journal of Electronic Commerce Studies, 2016
Internet pornography (Internet Porn) is addictive to teenagers and kids around the world. The nor... more Internet pornography (Internet Porn) is addictive to teenagers and kids around the world. The normal practice is to block those websites or filter out pornography from kids. Many research papers have been published how to detect a human pornographic image on web pages. A new technique was proposed here to classify pornography images using range of YCbCr (colour feature) and three new measurements: %Face_Area, %AHB and R max. A computer algorithm such as C4.5 was applied to construct a decision tree. The main contribution of this paper is simplicity that retains high accuracy within an acceptable processing time. The accuracy of experimental results was 85.2% with an average processing time of 0.21314 seconds per image.
TEM Journal
Learning Management System (LMS) is a traditional tool for E-learning. Combined with Machine Lear... more Learning Management System (LMS) is a traditional tool for E-learning. Combined with Machine Learning (ML), such technology has unprecedentedly allowed teachers to observe and understand students' behaviors and performance. This research aims to enhance individual learning results by classifying a risk group and offering a self-tutoring program. This paper adopts a machine-learning model and proposes a new algorithm named "RSU-ML-PL," which enables a personalized and self-tutoring system. Overall, the experiment revealed good progress in student marks on their final examinations. The final examination results show that 606 (79%) students in the risk group passed their exams.

International Journal for Applied Information Management
A location based service (LBS) is widely used on modern smartphone around the world asits built-i... more A location based service (LBS) is widely used on modern smartphone around the world asits built-in features. Each smartphone can access a google API or map. People can therefore share their location (latitude and longitude) among friends. Many LBS spots can easily form “location based mobile community (LBMC).” Since the nodes are mobile, the community group changes dynamically and is unstructured. Ant-based clustering algorithm is a special kind of optimization technique which is highly suitable for finding the adaptive clustering for volatile networks. This Paper Aims To form a location based mobile community (LBMC) by using Ant-based clustering algorithm. Due to the mobile type community, a vanishing community problem is also stated in this paper. Instead of redo a whole algorithm again, we modify an original algorithm by applying a pheromone concept to handle a change. Our algorithm is named as ABCA & VP which stands for Ant-Based Clustering Algorithm with Vanishing problem. More...

There are many kinds of online electronic courseware services including Google site, Apple’s iTun... more There are many kinds of online electronic courseware services including Google site, Apple’s iTunes U, Moodle web-based courseware, and massive open online courses.Knowledge in electronic courseware is widely available but in an unstructured data.Ontology is a good way to manipulate those unstructured data.This paper is aims to understand a user preference in adopting courseware service in an ontology form.An association rule (Data Mining) is applied to find out factors and conditions that lead to decision to choose a service.Due to its benefit to search engine, OWL format is chosen as a file format for this paper.Our experimental results show high percentages of confidence and lift values above 80% and greater than 1 respectively.From the relationship, we construct an ontology for user preference using OWL format The relationship between ontology knowledge management with user preferences is that knowledge representation represented in Ontology form and then knowledge is organized ...
Applying Machine Learning and AI on Self Automated Personalized Online Learning

In Knowledge and Data Engineering field, relational database is the best repository to store data... more In Knowledge and Data Engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set of relational tables with minimum data redundancy that preserve consistency and facilitate correct insertion, deletion, and modification. Normalization is a major task in the design of relational databases. Despite its importance, very few algorithms have been developed to be used in the design of commercial automatic normalization tools. It is also rare technique to do it automatically rather manually. Moreover, for a large and complex database as of now, it make even harder to do it manually. This paper presents a new complete automated relational database normalization method. It produces the directed graph and spanning tree, first. It then proceeds with generating the 2NF, 3NF and also ...
IJIIS: International Journal of Informatics and Information Systems
According to Pornography Statistics,more than 34 percent of Internet users exposeto pornography. ... more According to Pornography Statistics,more than 34 percent of Internet users exposeto pornography. There are 12 percent of the total number of websites and 72 million monthly visitors.Internet pornography (Internet Porn) is addictive to teenagers and kids around the world. The normal practice is to block those websites or filter out pornographyfrom kids.In order to do so, researchers has to find a way to detect and classify first. The pixel features including YCbCr range, area of human skin are chosen as pornographyfeatures because of their easy acquisition. C4.5 (Data mining technique)is applied to construct a decision tree. The purpose of this paper is to classify pornography images in a simple if-then rule. The accuracy of experimental result is 85.2%.
Guideline of Collinearity - Avoidable Regression Models on Time-series Analysis
2021 2nd International Conference on Big Data Analytics and Practices (IBDAP)
Nude image classification using rough set analysis
2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2015
Uploads
Papers by Chetneti Srisa-An