GSAS: Dissertations

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 6 of 179
  • Thumbnail Image
    Item
    Factors affecting stroke mortality in Thailand
    Pimchanok Puthkhao; Duanpen Theerawanviwat (National Institute of Development Administration, 2020)
    This dissertation aimed to compare the socioeconomic and health-related characteristics of stroke and non-stroke deaths and to determine the factors affecting stroke mortality, with non-stroke death considered as a competing risk. Secondary data with a 10-12 years follow-up period from the Thai Epidemiologic Stroke (TES) Study were used. The Thai Epidemiologic Stroke (TES) Study is a prospective community-based cohort study that recruited participants from the general population from five Thai regions. Between 2004 and 2006, 19,620 participants aged 45-80 years, free of stroke, participated in the baseline survey. The participants were followed up for mortality from the survey date until the date of death or the end of follow-up of December 31, 2016, whichever came firsts. During a median follow-up time of 11.08 years (202,803 person-years at risk), 305 participants died of a stroke (1.55% of total participants and accounted for 8.76% of total deaths), and 3,176 participants died of non-stroke cause (16.19% of total participants and 91.24% of total deaths). Stroke mortality was 150.39/100,000 (95% confidence interval [95% CI], 134.43-168.25/100,000) personyears, and the non-stroke mortality was 1,566.05/100,000 (95% CI, 1,512.52- 1,621.47/100,000) person-years. Multivariate cause-specific Cox regression and Fine-Gray competing risk regression analyses were used to identify the factors affecting stroke mortality, with non-stroke mortality considered as a competing event. Cause-specific hazard ratios (HR) and the Subdistribution hazard ratio (SHR) with their 95% confidence intervals (CI) were used to illustrate the associations.
  • Thumbnail Image
    Item
    Ontology-based knowledge discovery and exploring technology influencers from patent data
    Pranomkorn Ampornphan; Sutep Tongngam (National Institute of Development Administration, 2020)
    A patent is an important document issued by the government to protect inventions or product design. Inventions consist of mechanical structures, production processes, quality improvements of products, and so on. Generally, goods or appliances in everyday life are a result of an invention or product design that has been published in patent documents. A new invention contributes to the standard of living, improves productivity and quality, reduces production costs for industry, or delivers products with higher added value. Patent documents are considered to be excellent sources of knowledge in a particular field of technology, leading to inventions. Technology trend forecasting from patent documents depends on the subjective experience of experts. However, accumulated patent documents consist of a huge amount of text data, making it more difficult for those experts to gain knowledge precisely and promptly. Therefore, technology trend forecasting using objective methods is more feasible. There are many statistical methods applied to the patent analysis, for example, to technology overview, investment volume, and the technology life cycle. There are also data analytic methods by which patent documents can be classified, such as by technical characteristics, to support business decision-making as well as a taxonomy of concepts for knowledge representation by developing an ontology-based semantic search. The main contributions of this study were to extract knowledge from a patent relational database into two approaches; 1) Develop an ontology-based from patent data to provide an effective search for technological concepts, and 2) Explore technology influencers from patents using data analytics. We experimented with our techniques on data retrieved from the European Patent Office (EPO) website. In the first approach, the patent data was defined as terms, concepts, classes, and properties to create a patent ontology. A patent ontology consisted of the relations of each concept that were represented as an ontology map. Next, a patent database was created to integrate with the ontology map to develop an ontology-based application. The result from this stage was an ontology-based that facilitates as a recommender system. The second approach related to exploring technology influencers from patent data. The technique includes K-means clustering, text mining, and association rule mining methods. The patent data being analyzed by which the association rule mining was applied to find associative relationships among patent data, then combined with social network analysis (SNA) to further analyze technology trends. SNA provided metric measurements to explore the most influential technology as well as visualize data in various network layouts. This study demonstrated 2 approaches for knowledge discovery from patent data by which; 1) the expected output from the ontology-based will be used to support information searching for more relevant and precise information, and 2) the resultsfrom data analytics showed emerging technology clusters, their meaningful patterns, and a network structure, and suggested information for the development of technologies and inventions.
  • Thumbnail Image
    Item
    Ant colony system with Thailand green travelling problem
    Punyapas Chawaratthanarungsri; Sutep Tongngam (National Institute of Development Administration, 2020)
    Most industries focus on how to get the benefits from processing and transmitting even in tourism industry. Technology has been used to meet the need of travelers in order to access more information such as flight, route, hotel, transportation and others by themselves. There are some techniques of computer science that solve about travelling problem such as Artificial Intelligence and Animal stimulation is used such as ant behavior etc. Thus, this research proposes how to apply Ant Colony Optimization with travelling problem. As the result, Brute force was taken into consideration to compare the capabilities of The Ant Colony System. The results obtained from Ant Colony System have some routes equal to the shortest distance of Brutes Force, but some Brute Force routes have shortest distances. When looking at the performance of algorithm, the processing time to generate all possible paths of the Brute Force takes more time than Ant Colony System. The efficiency of the Brute Force algorithm is O(N2)(Christian and Thierry) while Any Colony System Only O(m logm)(Walter,). Using Ant Colony System by adding other conditions such as changing vehicles at each tourist attraction to complete the planning. It can be further expanded into a system of advice tourist for tourist recommended plan.
  • Thumbnail Image
    Item
    Relationships between psychological factors, innovative performance, marketing capability, and entrepreneurial success among Thai fruit and vegetable processing and preservation SMEs in Thailand
    Natthawat Wiwatkitbhuwadol; Arnond Sakworawich (National Institute of Development Administration, 2019)
    An entrepreneur starts and runs a business through the pursuit of opportunities with the determination to use his/her knowledge, abilities, and experiences to effectively run his/her organization and with the resources at hand. He/she is a creative person who finds new approaches to market existing merchandise or better ways to improve and develop existing production processes to maximize the organization’s benefits. He/she is willing to undertake a business venture in exchange for profits and satisfaction. These are the characteristics of a potentially successful entrepreneur. Entrepreneurial success is the primary goal of every entrepreneur, in the pursuit of which he/she must endure different kinds of problems to achieve this goal, and there are many ways to measure business success. The aim of this study is to analyze the relationships between the psychological factors, innovative performance, marketing capability, and entrepreneurial success among Thai Fruits and Vegetables Processing and Preservation SMEs in Thailand. This is one of the first empirical studies to adopt the Giessen-Amsterdam Model of Entrepreneurial Success as the main research model with some added variables that may affect entrepreneurial success identified from a literature review. Another research interest is the impact of the rising number of Thai Fruit and Vegetable Processing and Preservation SMEs entrepreneurs on global businesses due to increased quantities of imitation goods and services. The results of the study show that innovative performance, and marketing capability are highly related to entrepreneurial success. The developed strategies using innovative performance, and marketing capability drivers could help Thailand’s SMEs entrepreneurs to be successful in a variety of industries.
  • Thumbnail Image
    Item
    Closed-loop supply chain model analysis
    Jariya Seksan; Kannapha Amaruchkul (National Institute of Development Administration, 2019)
    In this dissertation, we analyzed the closed-loop supply chain with buyback contract. We considered the model with one manufacturer and one retailer. First, we derived the optimal order quantity, the optimal contract parameter and consider the condition that buyback contract can coordinate supply chain. Next, we extended the first part by considering for the return policy. We considered when customers return follows the customer’s willingness to return function which depends on return price. We derived the optimal return price and the optimal order quantity follows that price. We found that the optimal return price depends on the buyback price offered by the manufacturer. Then, we considered when the retailer engages in secondary market. The retailer sells the returned product at discount price of the new product in the secondary market. We derived for the optimal resale unit and secondary product price. We found that the retailer can gain more profit when selling returned product in secondary market. In addition, we found that buyback contract can coordinate closedloop supply chain. Using numerical results, some of the relationships between parameters and the expected profits were shown. The results showed that when the wholesale price increases, the order quantity and retailer’s expected profit decrease, but the manufacturer’s expected profit increases. Besides, when the buyback price increases, the order quantity and the retailer’s expected profit increase, but manufacturer’s expected profit decreases. The results also show that the return price 𝑟 and the buyback contract parameters (𝑤, 𝑏) affect the performances of closed-loop supply chain and both manufacturer and retailer receive more profit when the retailer sets the optimal return price. Finally, we present the special topic of using buyback contract in closed-loop supply chain to achieve sustainability: case of electrical and electronic equipment (EEE) and show that supply chain sustainability can be achieved through a buyback contract.
  • Thumbnail Image
    Item
    A provably group authentication protocol for various LTE networks
    Boriphat Kijjabuncha; Pipat Hiranvanichakorn (National Institute of Development Administration, 2018)
    Group authentication is beneficial for group work in the Long Term Evolution (LTE) networks because it reduces the traffic of networks. For practical use, members of a group should be able to come from different network providers. In addition, while some group members use a network service, others may use other network services. Although the group members are on different networks, they should be able to work together. To fulfill these needs, we propose a secure group authentication protocol (SEGA) in which each group member uses his/her long-term private key and public key to create shared secret (keys) with network devices, such as Home and mobile management entity (MME). These shared keys are computed by using the DiffieHellman key exchange and are utilized in the authentication process. By using this technique instead of pre-shared keys between mobile devices and network devices, SEGA is flexible and scalable. In SE-GA, only the first member in an MME’s area has to authenticate himself/herself with the Home, while the remaining members in the area can authenticate directly with the MME. Thus the protocol reduces the amount of network usage. In this research, authentication proof is also given using the well-known BAN logic. Security analysis of the proposed protocol is also given and a comparison of our protocol with SE-AKA and GLARM was demonstrated. According to the comparison, we can see that the proposed protocol outperforms the former ones.