Somsuphaprungyos, Suwit
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm Natho, Parinya; Somsuphaprungyos, Suwit; Boonmee, Salinun; Boonying, Sangtong
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp502-511

Abstract

The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems. These issues include opponents stealing a company's or nation's private information and harming the economy or the organization's security. Password hacking is a common tool used by hackers for illegal purposes. Password security against hackers is essential. There are several ways to hack passwords, including traffic interception, social engineering, credential stuffing, and password spraying. In an attempt to prevent hacking, hashing algorithms are therefore mostly employed to hash passwords, making password cracking more difficult. In the suggested work, several hashing techniques, including message digest (MD5), secure hash algorithms (SHA1, SHA2, and SHA3) have been used. They have become vulnerable as a result of being used to store passwords. A rainbow table attack is conceivable. Passwords produced with different hash algorithms can have their hash values attacked with the help of the Hashcat program. It is proven that the SHA3 algorithm can help with more secure password storage when compared to other algorithms.
An artificial intelligence technology for promoting hom-thong banana agriculture system Tanveenukool, Ratsames; Somsuphaprungyos, Suwit; Nokkurth, Boonyarit; Chamuthai, Likit; Bonguleaum, Patumwadee; Natho, Parinya
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 15, No 1: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v15.i1.pp568-579

Abstract

The hom-thong banana, being a high-value Thai export variety, is facing significant risk from disease outbreaks affecting crop yield and quality. Traditional visual inspection methods in detection of diseases are labor consuming, error-prone. This research addresses these limitations by developing a new artificial intelligence (AI)-based automatic disease detection system for the hom-thong banana industry on top of cutting-edge computer vision technology. The study employed deep learning object detection models, contrasting Roboflow, you only look once (YOLO)v11, and YOLOv12 architectures, which were trained on a large dataset of 2,576 images of Thai banana plantations. With systematic data augmentation techniques, the dataset was augmented to 6,184 images of seven types of disease under varied environmental conditions. The method entailed extensive preprocessing and evaluation of performance through precision, recall, and mean average precision (mAP) metrics. Outcomes indicated that YOLOv12 outperformed with 93.3% accuracy, 83.3% sensitivity, and 86.3% mAP@50 compared to standard inspection schemes. This research is applicable to Thailand's smart agriculture initiative by providing farmers with low-cost, accurate, and effective disease monitoring equipment. The application of this AI system has the ability to enhance the yield of crops, reduce losses, and enhance the competitiveness of Thai banana exports in the global market, in support of sustainable agricultural development.