บทความและงานวิจัย

The development of a chatbot system for higher education information service for high school students
The development of a chatbot system for higher education information service for high school students
ผู้เขียน Udsanee Pakdeetrakulwong, Naruapon Suwanwijit, Nuttachai Subangate, Suphada Thongthai, Sirinrat Panpradit วันที่เผยแพร่ 2020/7/10 คำอธิบาย For upper secondary education, one of the main functions of guidance teachers is to provide information services for tertiary education for students. However, from the preliminary study of the case study school, it was found that, a ratio between the number of guidance teachers and students was not suitable enough to provide services. Moreover, information service was usually limited only during the guidance study period. The objective of this research is to use digital technology to reduce the burden of guidance teachers by developing a chat bot system that can provide service related to higher education information. Students can inquire through the chat bot system at all times that they connect to the internet. From the systematic satisfaction evaluation of the sample of 20 students, it was found that the average satisfaction was at a high level. In addition, the developed chat bot system can be a prototype for further development or dissemination to use for guidance in other schools or in universities. บทความทางวิชาการ The development of a chatbot system for higher education information service for high school students U Pakdeetrakulwong, N Suwanwijit, N Subangate… - 2020 บทความที่เกี่ยวข้อง ทั้งหมด 2 ฉบับ
52 · บทความ · เผยแพร่ 27 มี.ค. 2569
A Multi-agent Approach for Semantic Annotation of Source Code Artefact
A Multi-agent Approach for Semantic Annotation of Source Code Artefact
ผู้เขียน Pornpit Wongthongtham, Udsanee Pakdeetrakulwong, Suksawat Sae-Lim, Worachet Uttha, Sutarat Chaonafang, Suphitcha Chanrueang, Supakit Nakpomchin, Somkiat Chormuan, Naruapon Suwanwijit คำอธิบาย A large volume of software project information is produced in software projects. Manually transforming or mapping them into a semantically rich form for shared understanding is time-consuming, laborious, tedious and prone to error. Hence, it is important to use a systematic approach to automate the knowledge capture of software project information. In this paper, the active Software Engineering Ontology through Multi-agent System (SEOMAS) approach for automated knowledge capture of software project information is proposed. The agents utilise the Software Engineering Ontology (SE Ontology) to capture knowledge from software development artefacts during the daily software development activity. The captured knowledge is populated as new instances in the SE Ontology repository to allow project team members and software agents to access it. It has been demonstrated that the captured knowledge can be put to practical use to clarify any ambiguity in remote communication and to facilitate effective and efficient coordination and knowledge sharing within a software development project. บทความทางวิชาการ A Multi-agent Approach for Semantic Annotation of Source Code Artefact P Wongthongtham, U Pakdeetrakulwong, S Sae-Lim… บทความที่เกี่ยวข้อง
45 · งานวิจัย · เผยแพร่ 27 มี.ค. 2569
Design Patterns to Enhance Security by Storing Passwords Encryption using Multiple Hashing Functions
Design Patterns to Enhance Security by Storing Passwords Encryption using Multiple Hashing Functions
Naruapon Suwanwijit Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand Somkiat Chormuan Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University,Thailand Worachet Uttha Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand Abstract The protection of personal information stored in the database of a web application is critical. Currently, securing personal information, especially passwords, has been introduced with the hash function. The hash function is a mathematical algorithm used to encrypt data in a single way that cannot be easily decrypted into original data. However, comparisons are used to verify the correctness of the data. In general, when encrypting a user's password, each web application will select a unique hash function or algorithm. The software has not been designed to provide the ability to easily modify the algorithm. The researchers found that the design pattern was used in good software design, with the "Strategy Pattern" being one of the key patterns of design patterns that can be applied in software design with a wide range of algorithms to choose from and support the freely modified algorithm to suit each situation. In this research, the researchers were interested in applying design patterns, both "Strategy Pattern" and "Factory Method Pattern," in the design and development of software in the section of hash functions, providing a wide range of encryption and instance selection of the hash function. The research results indicated that the system was flexible in changing and adding new hash functions to handle user password storage with multiple hash functions and also made passwords much more secure by adding complexity to system penetration compared to a single hash function.
1.7 พัน · บทความ · เผยแพร่ 10 ก.พ. 2568
Design Patterns to Enhance Security by Storing Passwords Encryption using Multiple Hashing Functions
Design Patterns to Enhance Security by Storing Passwords Encryption using Multiple Hashing Functions
Naruapon Suwanwijit Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand Somkiat Chormuan Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University,Thailand Worachet Uttha Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand Abstract The protection of personal information stored in the database of a web application is critical. Currently, securing personal information, especially passwords, has been introduced with the hash function. The hash function is a mathematical algorithm used to encrypt data in a single way that cannot be easily decrypted into original data. However, comparisons are used to verify the correctness of the data. In general, when encrypting a user's password, each web application will select a unique hash function or algorithm. The software has not been designed to provide the ability to easily modify the algorithm. The researchers found that the design pattern was used in good software design, with the "Strategy Pattern" being one of the key patterns of design patterns that can be applied in software design with a wide range of algorithms to choose from and support the freely modified algorithm to suit each situation. In this research, the researchers were interested in applying design patterns, both "Strategy Pattern" and "Factory Method Pattern," in the design and development of software in the section of hash functions, providing a wide range of encryption and instance selection of the hash function. The research results indicated that the system was flexible in changing and adding new hash functions to handle user password storage with multiple hash functions and also made passwords much more secure by adding complexity to system penetration compared to a single hash function.
1.78 พัน · งานวิจัย · เผยแพร่ 17 ธ.ค. 2567