บทความและงานวิจัย
Evaluating the Impact of Different Feature Scaling Techniques on Breast Cancer Prediction Accuracy
ผู้เขียน
Ekasak Chitcharoen, Naruapon Suwanwijit, Khachon Mongkonchoo, Nathaporn Utakrit, Siranee Nuchitprasitchai, Nalinpat Bhumpenpein
วันที่เผยแพร่
2023
วารสารวิชาการ
ADVANCE KNOWLEDGE FOR EXECUTIVES
บทความทางวิชาการ
Evaluating the Impact of Different Feature Scaling Techniques on Breast Cancer Prediction Accuracy*
E Chitcharoen, N Suwanwijit, K Mongkonchoo…
บทความที่เกี่ยวข้อง
49
·
งานวิจัย
·
เผยแพร่ 27 มี.ค. 2569
The development of a chatbot system for higher education information service for high school students
ผู้เขียน
Udsanee Pakdeetrakulwong, Naruapon Suwanwijit, Nuttachai Subangate, Suphada Thongthai, Sirinrat Panpradit
วันที่เผยแพร่
2020/7/10
คำอธิบาย
For upper secondary education, one of the main functions of guidance teachers is to provide information services for tertiary education for students. However, from the preliminary study of the case study school, it was found that, a ratio between the number of guidance teachers and students was not suitable enough to provide services. Moreover, information service was usually limited only during the guidance study period. The objective of this research is to use digital technology to reduce the burden of guidance teachers by developing a chat bot system that can provide service related to higher education information. Students can inquire through the chat bot system at all times that they connect to the internet. From the systematic satisfaction evaluation of the sample of 20 students, it was found that the average satisfaction was at a high level. In addition, the developed chat bot system can be a prototype for further development or dissemination to use for guidance in other schools or in universities.
บทความทางวิชาการ
The development of a chatbot system for higher education information service for high school students
U Pakdeetrakulwong, N Suwanwijit, N Subangate… - 2020
บทความที่เกี่ยวข้อง ทั้งหมด 2 ฉบับ
52
·
บทความ
·
เผยแพร่ 27 มี.ค. 2569
A comparative method in moblie application code conversion between Java and Kotlin
ผู้เขียน
NARUAPON SUWANWUIT, WORACHET UTTHA
วันที่เผยแพร่
2020/7/9
ผู้เผยแพร่
Nakhon Pathom Rajabhat University
คำอธิบาย
This paper aims to compare methods for the improvement of the application's code conversion from Java to Kotlin, uncovering results and problems regarding each technique. An application had been created. And by applying 3 different ways of converting the Java code conversation to Kotlin, each method had been then compared in terms of its effectiveness. Those 3 ways comprised: 1) conversion with a tool 2) conversion by creating a new fle with an old project, and 3) conversion by creating a new fle with a new project. However, the functions of the application must remain the same. Findings from this research study revealed problems and factors that can have an impact on the selection of code conversation from Java to Kotlin
บทความทางวิชาการ
A comparative method in moblie application code conversion between Java and Kotlin
N SUWANWUIT, W UTTHA - 2020
บทความที่เกี่ยวข้อง
57
·
งานวิจัย
·
เผยแพร่ 27 มี.ค. 2569
A Multi-agent Approach for Semantic Annotation of Source Code Artefact
ผู้เขียน
Pornpit Wongthongtham, Udsanee Pakdeetrakulwong, Suksawat Sae-Lim, Worachet Uttha, Sutarat Chaonafang, Suphitcha Chanrueang, Supakit Nakpomchin, Somkiat Chormuan, Naruapon Suwanwijit
คำอธิบาย
A large volume of software project information is produced in software projects. Manually transforming or mapping them into a semantically rich form for shared understanding is time-consuming, laborious, tedious and prone to error. Hence, it is important to use a systematic approach to automate the knowledge capture of software project information. In this paper, the active Software Engineering Ontology through Multi-agent System (SEOMAS) approach for automated knowledge capture of software project information is proposed. The agents utilise the Software Engineering Ontology (SE Ontology) to capture knowledge from software development artefacts during the daily software development activity. The captured knowledge is populated as new instances in the SE Ontology repository to allow project team members and software agents to access it. It has been demonstrated that the captured knowledge can be put to practical use to clarify any ambiguity in remote communication and to facilitate effective and efficient coordination and knowledge sharing within a software development project.
บทความทางวิชาการ
A Multi-agent Approach for Semantic Annotation of Source Code Artefact
P Wongthongtham, U Pakdeetrakulwong, S Sae-Lim…
บทความที่เกี่ยวข้อง
45
·
งานวิจัย
·
เผยแพร่ 27 มี.ค. 2569
การพัฒนาแอปพลิเคชันในการเรียนรู้คําศัพท์ภาษาอังกฤษระดับมัธยมศึกษาตอนปลาย และมหาวิทยาลัยตามมาตรฐานการวัดระดับความสามารถทางด้านภาษา ที่ได้รับการยอมรับในระดับสากลด้วยการสร้างต้นแบบ.
ผู้เขียน
Naruapon Suwanwijit
วันที่เผยแพร่
2021/7/5
การประชุม
รายงานสืบเนื่องการประชุมวิชาการระดับชาติ มหาวิทยาลัยราชภัฏนครปฐม ครั้งที่ 13
หน้า
1071-1079
59
·
งานวิจัย
·
เผยแพร่ 27 มี.ค. 2569
การเพิ่มความปลอดภัยรหัสผ่านของเว็บแอปพลิเคชันด้วยการสร้าง Salt แบบพลวัตและการย้อนกลับ Salt เพื่อนำไปใช้ในการรักษาความปลอดภัยด้วยแฮชฟังก์ชัน Bcrypt
ผู้เขียน
Naruapon Suwanwijit
วันที่เผยแพร่
2023/3/31
การประชุม
รายงานสืบเนื่องงานประชุมวิชาการเสนอผลงานวิจัยระดับชาติและนานาชาติ ด้านเทคโนโลยีคอมพิวเตอร์ประยุกต์และระบบสารสนเทศครั้งที่ 19 (ACTIS 2023),
หน้า
292-299
39
·
งานวิจัย
·
เผยแพร่ 27 มี.ค. 2569
แนวทางการประยุกต์ใช้ Singleton Design Pattern ที่เหมาะสมในการพัฒนาซอฟต์แวร์เชื่อมต่อกับฐานข้อมูล
ผู้เขียน
Naruapon Suwanwijit, Somkiat Chormuan, Worachet Uttha
วันที่เผยแพร่
2023/11/11
การประชุม
รายงานสืบเนื่องการประชุมวิชาการระดับประเทศทางด้านเทคโนโลยีสารสนเทศครั้งที่ 15 (NCIT2023)
หน้า
109-115
48
·
งานวิจัย
·
เผยแพร่ 27 มี.ค. 2569
Design Patterns to Enhance Security by Storing Passwords Encryption using Multiple Hashing Functions
Naruapon Suwanwijit
Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand
Somkiat Chormuan
Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University,Thailand
Worachet Uttha
Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand
Abstract
The protection of personal information stored in the database of a web application is critical. Currently, securing personal information, especially passwords, has been introduced with the hash function. The hash function is a mathematical algorithm used to encrypt data in a single way that cannot be easily decrypted into original data. However, comparisons are used to verify the correctness of the data. In general, when encrypting a user's password, each web application will select a unique hash function or algorithm. The software has not been designed to provide the ability to easily modify the algorithm. The researchers found that the design pattern was used in good software design, with the "Strategy Pattern" being one of the key patterns of design patterns that can be applied in software design with a wide range of algorithms to choose from and support the freely modified algorithm to suit each situation. In this research, the researchers were interested in applying design patterns, both "Strategy Pattern" and "Factory Method Pattern," in the design and development of software in the section of hash functions, providing a wide range of encryption and instance selection of the hash function. The research results indicated that the system was flexible in changing and adding new hash functions to handle user password storage with multiple hash functions and also made passwords much more secure by adding complexity to system penetration compared to a single hash function.
1.7 พัน
·
บทความ
·
เผยแพร่ 10 ก.พ. 2568
Design Patterns to Enhance Security by Storing Passwords Encryption using Multiple Hashing Functions
Naruapon Suwanwijit
Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand
Somkiat Chormuan
Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University,Thailand
Worachet Uttha
Software Engineering, Faculty of Science and Technology, Nakhon Pathom Rajabhat University, Thailand
Abstract
The protection of personal information stored in the database of a web application is critical. Currently, securing personal information, especially passwords, has been introduced with the hash function. The hash function is a mathematical algorithm used to encrypt data in a single way that cannot be easily decrypted into original data. However, comparisons are used to verify the correctness of the data. In general, when encrypting a user's password, each web application will select a unique hash function or algorithm. The software has not been designed to provide the ability to easily modify the algorithm. The researchers found that the design pattern was used in good software design, with the "Strategy Pattern" being one of the key patterns of design patterns that can be applied in software design with a wide range of algorithms to choose from and support the freely modified algorithm to suit each situation. In this research, the researchers were interested in applying design patterns, both "Strategy Pattern" and "Factory Method Pattern," in the design and development of software in the section of hash functions, providing a wide range of encryption and instance selection of the hash function. The research results indicated that the system was flexible in changing and adding new hash functions to handle user password storage with multiple hash functions and also made passwords much more secure by adding complexity to system penetration compared to a single hash function.
1.78 พัน
·
งานวิจัย
·
เผยแพร่ 17 ธ.ค. 2567