Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Puchong Subpratatsavee is active.

Publication


Featured researches published by Puchong Subpratatsavee.


Archive | 2015

Transaction Authentication Using HMAC-Based One-Time Password and QR Code

Puchong Subpratatsavee; Pramote Kuacharoen

Conducting financial transactions over the Internet has been widely adopted due to the convenience and usability. However, conducting financial transactions via the Internet may be subjected to many types of attacks including password attacks, malware, phishing, and other unauthorized activities. Many banks have enhanced their security by using One-Time Password (OTP) as another authentication method in addition to traditional username and password. The OTP may be sent to the mobile phone number of the account owner via SMS. Even with the enhanced security measure, internet banking is still vulnerable to different types of attacks such as online phishing. We propose, design, and implement a transaction authentication scheme using HMAC-based mobile OTP and QR Code. Our scheme is resilient to known attacks including, but not limited to, eavesdropping, replay, message modification, and phishing.


computer science and software engineering | 2014

HC2D barcode reader using embedded camera in Android phone

Puchong Subpratatsavee; Narongrit Janthong; Preeyawal Kuha; Chanchira Chintho

The HC2D barcode is a highest capacity of 2D barcode while it occupies a small area. The size of the HC2D barcode is suitable for displaying on print media such as paper and poster. But, for reading the HC2D barcode, the bit representation of the barcode is obtained by scanning the image of the barcode with scanner machine only. This paper shows the implementations of image reorganization of HC2D barcodes in mobile phones with android operating system. The mobile phone system used here consists of a camera, mobile application and display device, and the source image is captured by the embedded camera device. The introduced algorithm is based on the code area found by two vertical line, one horizontal line and dash line detection of HC2D barcode. This algorithm is robust for the real-time recognition of the HC2D barcodes and an average recognition rate is 91.33%.


Applied Mechanics and Materials | 2015

Automated Car Parking Authentication System Using NFC and Public Key Cryptography Based on Android Phone

Puchong Subpratatsavee; Worasitti Sriboon; Weeraphan Issavasopon

Nowadays, the car is cheaper than the former. As a result, consumers are increase buying new cars. It make the car parking service is experiencing problems about car information management. One problem is car theft. Because of driver can drive his car into and out of the parking is use only a car parking card for authentication. From the reasons discussed above, the car thief can occur. If owner of car leaving his car and forget parking card in his car or parking card was stolen. Car thieves were able to drive the car out of the parking is easy. This paper presents the concept and how to solve such problems. By apply of NFC technology on android phones and public key cryptography algorithm for use to open the gate of car parking automatically. The user must get the digital ticket from android application using his username and password and then drive his car into the car parking and touch his android phone on the NFC podium if authentic the gate will be open.


Applied Mechanics and Materials | 2015

A Design and Implementation of Attendance System Using Smallest Wireless Fingerprint with Arduino Yún Embedded Board

Puchong Subpratatsavee; Narinwat Pubpruankun

The purpose of this research is a design and implementation of a smallest wireless fingerprint device based on Arduino Yún board. This system applies for using in class attendance checking in school or university. The exper-imental of class attendance using wireless fingerprint in this research is examinations in Kasetsart University Siracha Campus, Thailand for case study. All hardware environments of this system-using platform of Arduino Yún board and Ubuntu OS apply with computer program like MySQL, JavaScript, Apache server, and wireless network for building an embedded fingerprint authentication system. Design of a new smallest wireless fingerprint in this research is small and easy to use. It has a LCD screen for show the result of identifying after users scan they fingerprint on it. This system is applying to use in class attendance. When student come in a class he or she scan his fingerprint on our device for checking and authentications. After device receive data from his fingerprint then device send this data to server using wireless network. When server get the data by device from network already, it will send this data to fingerprint authentications program for loading and checking data of fingerprint in database. If his fingerprint data is match one of data in database the server will be sent the name and information of matching fingerprint data back to LCD screen of device and show valid text on the screen and update the status of fingerprint owner to attendance system. If his fingerprint not math in all of data in database, it invalid. This research help an instructor for reduce time for checking student attendance; solve the problem about some student absent but his or her friend fake attendance for him. And in the future this device will be replacing the student ID card


Applied Mechanics and Materials | 2015

HC2D Barcode for Handwritings Verification Using Embedded Camera on Tablet

Puchong Subpratatsavee; Wissawat Sakulsaknimit

The authentication of a person is used to determine the stage of the transaction, such as a password or authentication by biometric verification. However, the majority such as financial transactions, and communications sector confirmed the use of credit cards and checks your ID card at all. Biometric identification method fingerprints, photographs, and signatures, especially the signature is the most popular. It is simple and easy to use. The signature can be easily copied in a short time because it does not require any special tools or equipment tampering. This paper presents the person identification using handwritten signatures is based on the detection of movement and HC2D Barcode false acceptance rate and false rejection rate is 0 and 0.2.


Applied Mechanics and Materials | 2015

Embedded Wireless Automatically Watering Plants Using UAV

Puchong Subpratatsavee; Peeyawal Kuha; Peerapon Pudtuan

In this paper is intended to study and develop embedded systems for use in controlling the operation of the Unmanned Aerial Vehicle (UVA) to work effectively under automatic control system. As well as to design flight control 4 blades, which uses an ATmega328 microcontroller controls the four motors and fly under equilibrium conditions. The embedded system is defined boundary conditions for UAV to suit the operation of the UAV. The Wi-Fi signal is used to transmit data in order to bring the instruction set processor to control the operation of UAV and displayed to the user immediately. Operation of the UAV based on the conditions that were set by the user to suit the scope of work that user need. Nowadays, high technology machines and robots for use in agriculture is very much in some areas. In order to reduce the work of human and still operates efficiently as well. Thus was born the idea to put apply including embedded systems and robotics in order to be used in agriculture to function effectively. Appropriate to the environment and work under human control.


Applied Mechanics and Materials | 2015

A Security of Circular Email in Manufacturing

Puchong Subpratatsavee; Chanchira Chintho; Suchai Tanaiadehawoot

In present, manufacturing organizations in some countries will have to submitinformation to both internal and external to the organization, called circular mail to report newswithin the organization or external relations. Administrative officer is responsibility about to senda circular mail for each organization and will be responsible for receiving letters in paper form orpublication or media message. Then the administrative officer will be read and extracted the letterand send a message in the form of emails to receivers as indicated on the letter. In mailings sendsuch potential attacks from disgruntled individuals; such as a change of email messages duringtransmission or identity thieves use a fake email address to send officials to the other party. If anattack occurs, the organization will make a loss. In terms of stability credibility and security in theuse of corporate email. This paper presents a model and how to send an email or letter online ina format that is more stable and secure by the applied technology of public key cryptography andhash function to encrypt the message to provide stability and security in the mails circulars online.


Applied Mechanics and Materials | 2015

Home Patient Sensor and Monitor System Using IPhone

Puchong Subpratatsavee; Tanabat Promjun

Health-care situations in present have pass to be a technology-based. In addition to handheld devices like a mobile phone and their habit has risen abundant in current period. This research presents the design and implementation of application on IPhone for patient health-care. A physique zone network is a WIFI of biomedical sensors that are around to a man body. The aim of wireless body area network is to assist the progress of continuous recording and monitoring of a person’s health circumstances and transfer it over a long-distance exchanging network. The parameters sensed by the distinctive devices are to be moved onto a mobile phone or a tablet using wireless network. This information is then assembled, stored, check for threshold and then sent to the doctor for constant monitoring of the patient’s health condition. The doctor can thus access the patient’s health status on the go and this will help the patient to get suddenly attention in life-threatening situations.


Applied Mechanics and Materials | 2015

How to Save Energy in Thailand Industrial Manufacturing

Puchong Subpratatsavee; Chotirod Supsanung

Energy is a key factor in the comfort and well-being of people in different countries both developed and developing countries, as well as directly to national security, political, military, economic, social and especially power components and important for economic development in all fields such as agriculture, industry, business, housing, construction, electricity, water, transport and communications by the consumption of energy is directly related to the economic and social development of the country, if developed, the more they need to increase power consumption as well and if used incorrectly and does not save energy, it makes the energy gone very quickly. Therefore, all countries need to find ways to prevent and resolve such problems by requiring conservation measures for energy efficiency in both the short and long term.


Applied Mechanics and Materials | 2015

The Problem of Organization and Industry after Using ERP

Puchong Subpratatsavee; Chutimon Tiensai

Current industrial manufacturing or agencies tend to adopt ERP systems into applications to enhance the work of the administration of the organization. The use the ERP system is not easy. They also have to endure the force of employees in an organization that does not change the original work. To the development of corporate ERP is slow. This research focuses on the analysis of problems and issues that come up that I use the ERP system ERP reason to successfully injected problems in the organization.

Collaboration


Dive into the Puchong Subpratatsavee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pramote Kuacharoen

National Institute of Development Administration

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge