{"id":3539,"date":"2019-10-31T10:00:18","date_gmt":"2019-10-31T03:00:18","guid":{"rendered":"https:\/\/www.informatics.buu.ac.th\/2020\/?p=3539"},"modified":"2019-11-01T11:58:11","modified_gmt":"2019-11-01T04:58:11","slug":"%e0%b8%99%e0%b8%b4%e0%b8%aa%e0%b8%b4%e0%b8%95%e0%b9%81%e0%b8%a5%e0%b8%b0%e0%b8%9a%e0%b8%b8%e0%b8%84%e0%b8%a5%e0%b8%b2%e0%b8%81%e0%b8%a3%e0%b9%80%e0%b8%82%e0%b9%89%e0%b8%b2%e0%b8%a3%e0%b9%88%e0%b8%a7","status":"publish","type":"post","link":"https:\/\/www.informatics.buu.ac.th\/2020\/?p=3539","title":{"rendered":"\u0e19\u0e34\u0e2a\u0e34\u0e15\u0e41\u0e25\u0e30\u0e1a\u0e38\u0e04\u0e25\u0e32\u0e01\u0e23\u0e40\u0e02\u0e49\u0e32\u0e23\u0e48\u0e27\u0e21\u0e19\u0e33\u0e40\u0e2a\u0e19\u0e2d\u0e1c\u0e25\u0e07\u0e32\u0e19\u0e27\u0e34\u0e08\u0e31\u0e22\u0e41\u0e25\u0e30\u0e1c\u0e25\u0e07\u0e32\u0e19\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e43\u0e19\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e0a\u0e38\u0e21\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e0a\u0e32\u0e15\u0e34 NCIT2019 \u0e41\u0e25\u0e30 InCIT2019"},"content":{"rendered":"<p>\u0e04\u0e13\u0e30\u0e27\u0e34\u0e17\u0e22\u0e32\u0e01\u0e32\u0e23\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e02\u0e2d\u0e41\u0e2a\u0e14\u0e07\u0e04\u0e27\u0e32\u0e21\u0e22\u0e34\u0e19\u0e14\u0e35\u0e01\u0e31\u0e1a\u0e04\u0e13\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c\u0e41\u0e25\u0e30\u0e19\u0e34\u0e2a\u0e34\u0e15\u0e04\u0e13\u0e30\u0e27\u0e34\u0e17\u0e22\u0e32\u0e01\u0e32\u0e23\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e17\u0e35\u0e48\u0e44\u0e14\u0e49\u0e19\u0e33\u0e40\u0e2a\u0e19\u0e2d\u0e1c\u0e25\u0e07\u0e32\u0e19\u0e27\u0e34\u0e08\u0e31\u0e22\u0e41\u0e25\u0e30\u0e1c\u0e25\u0e07\u0e32\u0e19\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e43\u0e19\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e0a\u0e38\u0e21\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e0a\u0e32\u0e15\u0e34\u0e04\u0e23\u0e31\u0e49\u0e07\u0e17\u0e35\u0e48 11 National Conference on Information Technology (NCIT2019) \u0e41\u0e25\u0e30\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e0a\u0e38\u0e21\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e19\u0e32\u0e19\u0e32\u0e0a\u0e32\u0e15\u0e34 \u0e04\u0e23\u0e31\u0e49\u0e07\u0e17\u0e35\u0e48 4 The 4th International Conference on Information Technology (InCIT2019) \u0e13 \u0e04\u0e13\u0e30\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e44\u0e17\u0e22-\u0e0d\u0e35\u0e48\u0e1b\u0e38\u0e48\u0e19 (TNI) \u0e01\u0e23\u0e38\u0e07\u0e40\u0e17\u0e1e\u0e2f \u0e0b\u0e36\u0e48\u0e07\u0e08\u0e31\u0e14\u0e42\u0e14\u0e22\u0e2a\u0e20\u0e32\u0e04\u0e13\u0e1a\u0e14\u0e35\u0e04\u0e13\u0e30\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e41\u0e2b\u0e48\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22 \u0e23\u0e48\u0e27\u0e21\u0e01\u0e31\u0e1a \u0e04\u0e13\u0e30\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e44\u0e17\u0e22-\u0e0d\u0e35\u0e48\u0e1b\u0e38\u0e48\u0e19 (TNI) \u0e43\u0e19\u0e23\u0e30\u0e2b\u0e27\u0e48\u0e32\u0e07\u0e27\u0e31\u0e19\u0e17\u0e35\u0e48 24-25 \u0e15\u0e38\u0e25\u0e32\u0e04\u0e21 \u0e1e.\u0e28.2562 \u0e17\u0e35\u0e48\u0e1c\u0e48\u0e32\u0e19\u0e21\u0e32 \u0e42\u0e14\u0e22\u0e21\u0e35\u0e23\u0e32\u0e22\u0e0a\u0e37\u0e48\u0e2d\u0e14\u0e31\u0e07\u0e19\u0e35\u0e49<\/p>\n<table border=\"1\" width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"340\"><strong>InCIT 2019<\/strong><\/td>\n<td width=\"312\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\"><strong>\u0e25\u0e33\u0e14\u0e31\u0e1a\u0e17\u0e35\u0e48<\/strong><\/td>\n<td align=\"center\" width=\"292\"><strong>\u0e2b\u0e31\u0e27\u0e02\u0e49\u0e2d<\/strong><\/td>\n<td align=\"center\" width=\"312\"><strong>\u0e1c\u0e39\u0e49\u0e27\u0e34\u0e08\u0e31\u0e22<\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">1<\/td>\n<td width=\"292\">Engage and Motivate Developers for Scrum Adopting with Gamification<\/td>\n<td width=\"312\">Wantana Sisomboon, Nuttaporn Phakdee, Nuansri Denwattana<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">2<\/td>\n<td width=\"292\">Forecasting Daily Air Quality in Northern Thailand Using Machine Learning Techniques<\/td>\n<td width=\"312\">Supawadee Srikamdee, Janya Onpans<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">3<\/td>\n<td width=\"292\">Physical Activity Recognition Using Streaming Data from Wrist-worn Sensors<\/td>\n<td width=\"312\">Katika Kongsil, Jakkarin Suksawatchon, Ureerat Suksawatchon<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">4<\/td>\n<td width=\"292\">AppDOSI: An Application for Analyzing and Monitoring the Personal Software Process<\/td>\n<td width=\"312\">Nuansri Denwatana, Apisit Saengsai, Eakachai Charoenchaimonkon<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">5<\/td>\n<td width=\"292\">Key Factors of Usability of Science and Technology Faculties&#8217; Website: Marketing Purpose<\/td>\n<td width=\"312\">Prajaks Jitngernmadan, Prawit Boonmee<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">6<\/td>\n<td width=\"292\">Tunica Media Localization in Intravascular Image with Shadow Artifact Constraint using Circular-like Estimating Techniques<\/td>\n<td width=\"312\">Jiraporn Wongwarn, Suwanna Rasmequan<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">7<\/td>\n<td width=\"292\">Region of Interest Identification on Low- Resolution Lateral Spine Radiography Image using Density-based and Ellipse-like Method<\/td>\n<td width=\"312\">Saowalak Thamnawat, John Gatewood Ham, Suwanna Rasmequan<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">8<\/td>\n<td width=\"292\">Segmentation of Shinbone Interosseous Space using GVF Techniques<\/td>\n<td width=\"312\">Siwakorn Artraksa, John Gatewood Ham, Krisana Chinnasarn<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">9<\/td>\n<td width=\"292\">Information of Sulci Vector for classifying Hydrocephalus and Cerebral Atrophy Symptom<\/td>\n<td width=\"312\">Onsiri Singkorn, Krisana Chinnasarn<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table border=\"1\" width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"340\"><strong>NCIT 2019<\/strong><\/td>\n<td width=\"312\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\"><strong>\u0e25\u0e33\u0e14\u0e31\u0e1a\u0e17\u0e35\u0e48<\/strong><\/td>\n<td align=\"center\" width=\"292\"><strong>\u0e2b\u0e31\u0e27\u0e02\u0e49\u0e2d<\/strong><\/td>\n<td align=\"center\" width=\"312\"><strong>\u0e1c\u0e39\u0e49\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e19<\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">1<\/td>\n<td width=\"292\">\u0e41\u0e1f\u0e49\u0e21\u0e1b\u0e23\u0e30\u0e27\u0e31\u0e15\u0e34\u0e04\u0e23\u0e38\u0e20\u0e31\u0e13\u0e11\u0e4c\u0e41\u0e1a\u0e1a\u0e1e\u0e25\u0e27\u0e31\u0e12\u0e19\u0e4c \u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e2d\u0e38\u0e14\u0e21\u0e28\u0e36\u0e01\u0e29\u0e32 \u0e42\u0e14\u0e22\u0e43\u0e0a\u0e49\u0e2a\u0e16\u0e32\u0e1b\u0e31\u0e15\u0e22\u0e01\u0e23\u0e23\u0e21\u0e40\u0e0a\u0e34\u0e07\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23<\/td>\n<td width=\"312\">\u0e19\u0e27\u0e25\u0e28\u0e23\u0e35 \u0e40\u0e14\u0e48\u0e19\u0e27\u0e31\u0e12\u0e19\u0e32, \u0e13\u0e31\u0e10\u0e1e\u0e23 \u0e20\u0e31\u0e01\u0e14\u0e35, \u0e28\u0e38\u0e20\u0e01\u0e34\u0e08 \u0e2d\u0e19\u0e38\u0e1e\u0e07\u0e29\u0e4c<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">2<\/td>\n<td width=\"292\">Chatbot for Supporting Programming Beginners<\/td>\n<td width=\"312\">\u0e1e\u0e35\u0e23\u0e30\u0e28\u0e31\u0e01\u0e14\u0e34\u0e4c \u0e40\u0e1e\u0e35\u0e22\u0e23\u0e1b\u0e23\u0e30\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e4c, \u0e20\u0e31\u0e17\u0e23\u0e1e\u0e25 \u0e2b\u0e21\u0e27\u0e01\u0e21\u0e13\u0e35<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" width=\"49\">3<\/td>\n<td width=\"292\">\u0e23\u0e30\u0e1a\u0e1a\u0e15\u0e49\u0e19\u0e41\u0e1a\u0e1a\u0e40\u0e1d\u0e49\u0e32\u0e23\u0e30\u0e27\u0e31\u0e07\u0e1d\u0e38\u0e48\u0e19\u0e25\u0e30\u0e2d\u0e2d\u0e07\u0e02\u0e19\u0e32\u0e14\u0e40\u0e25\u0e47\u0e01\u0e43\u0e19\u0e42\u0e23\u0e07\u0e07\u0e32\u0e19\u0e2d\u0e38\u0e15\u0e2a\u0e32\u0e2b\u0e01\u0e23\u0e23\u0e21\u0e43\u0e19\u0e40\u0e27\u0e25\u0e32\u0e08\u0e23\u0e34\u0e07\u0e14\u0e49\u0e27\u0e22 IoT<\/td>\n<td width=\"312\">\u0e2d\u0e07\u0e2d\u0e32\u0e08 \u0e2a\u0e2d\u0e19\u0e07\u0e32\u0e21, \u0e2a\u0e34\u0e17\u0e18\u0e34\u0e42\u0e0a\u0e04 \u0e2d\u0e38\u0e48\u0e19\u0e04\u0e33, \u0e27\u0e34\u0e27\u0e31\u0e12\u0e19\u0e4c\u0e0a\u0e31\u0e22 \u0e2a\u0e16\u0e32\u0e1e\u0e23\u0e19\u0e1e\u0e04\u0e38\u0e13, \u0e1b\u0e23\u0e30\u0e08\u0e31\u0e01\u0e29\u0e4c \u0e08\u0e34\u0e15\u0e40\u0e07\u0e34\u0e19\u0e21\u0e30\u0e14\u0e31\u0e19<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3549\" src=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/buuinform-pic04.jpg\" alt=\"\" width=\"5273\" height=\"3589\" srcset=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/buuinform-pic04.jpg 5273w, https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/buuinform-pic04-300x204.jpg 300w, https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/buuinform-pic04-768x523.jpg 768w, https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/buuinform-pic04-1024x697.jpg 1024w\" sizes=\"auto, (max-width: 5273px) 100vw, 5273px\" \/><\/p>\n<div id='gallery-1' class='gallery galleryid-3539 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.informatics.buu.ac.th\/2020\/?attachment_id=3550'><img loading=\"lazy\" decoding=\"async\" width=\"370\" height=\"277\" src=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/isearl_2-370x277.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.informatics.buu.ac.th\/2020\/?attachment_id=3551'><img loading=\"lazy\" decoding=\"async\" width=\"370\" height=\"277\" src=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/katika_ureerat_jakkarin-370x277.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.informatics.buu.ac.th\/2020\/?attachment_id=3552'><img loading=\"lazy\" decoding=\"async\" width=\"370\" height=\"277\" src=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/kst_1-370x277.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.informatics.buu.ac.th\/2020\/?attachment_id=3553'><img loading=\"lazy\" decoding=\"async\" width=\"370\" height=\"277\" src=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/ongart_2-370x277.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.informatics.buu.ac.th\/2020\/?attachment_id=3554'><img loading=\"lazy\" decoding=\"async\" width=\"370\" height=\"277\" src=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/peerasak_3-370x277.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.informatics.buu.ac.th\/2020\/?attachment_id=3555'><img loading=\"lazy\" decoding=\"async\" width=\"370\" height=\"277\" src=\"https:\/\/www.informatics.buu.ac.th\/2020\/wp-content\/uploads\/2019\/10\/prawit_2-370x277.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t<\/div><\/figure>\n\t\t<\/div>\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0e04\u0e13\u0e30\u0e27\u0e34\u0e17\u0e22\u0e32\u0e01\u0e32\u0e23\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e02\u0e2d\u0e41\u0e2a\u0e14\u0e07\u0e04\u0e27\u0e32\u0e21\u0e22\u0e34\u0e19\u0e14\u0e35\u0e01\u0e31\u0e1a\u0e04\u0e13\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c\u0e41\u0e25\u0e30\u0e19\u0e34\u0e2a\u0e34\u0e15\u0e04\u0e13\u0e30\u0e27\u0e34\u0e17\u0e22\u0e32\u0e01\u0e32\u0e23\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e17\u0e35\u0e48\u0e44\u0e14\u0e49\u0e19\u0e33\u0e40\u0e2a\u0e19\u0e2d\u0e1c\u0e25\u0e07\u0e32\u0e19\u0e27\u0e34\u0e08\u0e31\u0e22\u0e41\u0e25\u0e30\u0e1c\u0e25\u0e07\u0e32\u0e19\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e43\u0e19\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e0a\u0e38\u0e21\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e0a\u0e32\u0e15\u0e34\u0e04\u0e23\u0e31\u0e49\u0e07\u0e17\u0e35\u0e48 11 National Conference on Information Technology (NCIT2019) \u0e41\u0e25\u0e30\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e0a\u0e38\u0e21\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e19\u0e32\u0e19\u0e32\u0e0a\u0e32\u0e15\u0e34 \u0e04\u0e23\u0e31\u0e49\u0e07\u0e17\u0e35\u0e48 4 The 4th International Conference on Information Technology (InCIT2019) \u0e13 \u0e04\u0e13\u0e30\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e44\u0e17\u0e22-\u0e0d\u0e35\u0e48\u0e1b\u0e38\u0e48\u0e19 (TNI) \u0e01\u0e23\u0e38\u0e07\u0e40\u0e17\u0e1e\u0e2f \u0e0b\u0e36\u0e48\u0e07\u0e08\u0e31\u0e14\u0e42\u0e14\u0e22\u0e2a\u0e20\u0e32\u0e04\u0e13\u0e1a\u0e14\u0e35\u0e04\u0e13\u0e30\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e41\u0e2b\u0e48\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22 \u0e23\u0e48\u0e27\u0e21\u0e01\u0e31\u0e1a \u0e04\u0e13\u0e30\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e44\u0e17\u0e22-\u0e0d\u0e35\u0e48\u0e1b\u0e38\u0e48\u0e19 (TNI) \u0e43\u0e19\u0e23\u0e30\u0e2b\u0e27\u0e48\u0e32\u0e07\u0e27\u0e31\u0e19\u0e17\u0e35\u0e48 24-25 \u0e15\u0e38\u0e25\u0e32\u0e04\u0e21 \u0e1e.\u0e28.2562 \u0e17\u0e35\u0e48\u0e1c\u0e48\u0e32\u0e19\u0e21\u0e32 \u0e42\u0e14\u0e22\u0e21\u0e35\u0e23\u0e32\u0e22\u0e0a\u0e37\u0e48\u0e2d\u0e14\u0e31\u0e07\u0e19\u0e35\u0e49 InCIT 2019 \u0e25\u0e33\u0e14\u0e31\u0e1a\u0e17\u0e35\u0e48 \u0e2b\u0e31\u0e27\u0e02\u0e49\u0e2d \u0e1c\u0e39\u0e49\u0e27\u0e34\u0e08\u0e31\u0e22 1 Engage and Motivate Developers for Scrum Adopting with Gamification Wantana Sisomboon, Nuttaporn [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":3577,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3"],"_links":{"self":[{"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=\/wp\/v2\/posts\/3539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3539"}],"version-history":[{"count":12,"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=\/wp\/v2\/posts\/3539\/revisions"}],"predecessor-version":[{"id":3558,"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=\/wp\/v2\/posts\/3539\/revisions\/3558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=\/wp\/v2\/media\/3577"}],"wp:attachment":[{"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.informatics.buu.ac.th\/2020\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}