Claim Missing Document
Check
Articles

Found 2 Documents
Search

Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm Natho, Parinya; Somsuphaprungyos, Suwit; Boonmee, Salinun; Boonying, Sangtong
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp502-511

Abstract

The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems. These issues include opponents stealing a company's or nation's private information and harming the economy or the organization's security. Password hacking is a common tool used by hackers for illegal purposes. Password security against hackers is essential. There are several ways to hack passwords, including traffic interception, social engineering, credential stuffing, and password spraying. In an attempt to prevent hacking, hashing algorithms are therefore mostly employed to hash passwords, making password cracking more difficult. In the suggested work, several hashing techniques, including message digest (MD5), secure hash algorithms (SHA1, SHA2, and SHA3) have been used. They have become vulnerable as a result of being used to store passwords. A rainbow table attack is conceivable. Passwords produced with different hash algorithms can have their hash values attacked with the help of the Hashcat program. It is proven that the SHA3 algorithm can help with more secure password storage when compared to other algorithms.
Smart tourism application: towards software development for artificial intelligence in tourism management Natho, Parinya; Sarathum, Adisak; Sookjam, Amnaj; Putthidech, Anek; Boonmee, Salinun
Bulletin of Electrical Engineering and Informatics Vol 14, No 6: December 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i6.10820

Abstract

Artificial intelligence (AI) can manage tourism by optimizing, personalizing the experience, and enhancing user interactions. This research presents the Ayutthaya tourism platform independent model (ATPiM), an intelligent tourism application that integrates a domain-specific language (DSL) designed for chatbot development with machine learning algorithms that generate personalized recommendations based on user preferences, historical data, and real-time contextual influences. This pre-experimental design measures performance on parameters such as response time, recommendation accuracy, and system latency. The outcomes indicate that the mean time taken to respond to a user's query was 2.3 seconds, with 88.5% recommendation accuracy, and no latency. The AI-based recommendation system achieved 89.7% accuracy at destinations, 87.2% at accommodations, 90.3% at itineraries, and 85.6% at activities, with corresponding recalls of 85.4%, 83.5%, 88.1%, and 80.2% respectively. Although these results are promising, a 6.2% error rate for the advanced search, along with data security are some of the remaining issues. The findings reveal that the development of new user-centric and sustainable solutions for tourism, which leverage state-of-the-art natural language processing approaches, can enhance data security and provide additional new technologies, such as augmented reality (AR) and blockchain, for use in tourism.