Browsing by Title

Sort by: Order: Results:

  • Wai, Hnin Yu; Thein, Yadana (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Steganography is the method of communicating secrete information hidden in the cover object, that may be text, image, audio, video, and protocol for the purpose of hidden the existence of secret messages. In this ...
  • Tun, Thant Zin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, virtualization technologies become increasingly popular in enterprise and organizational networks: such as data center. In order to facilitate fault management, highavailability, load balancing and low-level ...
  • Mon, Aye Aye; Mar, Khin Thet (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today’s connected society requires secure information system to preserve data privacy and authentication in critical applications. This paper intends to implement secure web development system for critical applications. ...
  • Aung, Wai Zin; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to existential forgeries requires redundancy ...
  • Wai, Koung Hsu (University of Computer Studies, Yangon, 2022-06)
    Data security plays an important role in every organization. Therefore, many organizations need to protect their information or data when data in transmission. This system intends to implement the combination of the ...
  • Thu, Chan Myae (University of Computer Studies, Yangon, 2022-09)
    Today people are widely used internet, electronic records because of their ease of alteration and fast transition. The society is becoming more and more digitalized – therefore Information security is becoming more ...
  • Phu, Khing Shwe Ye (University of Computer Studies, Yangon, 2022-09)
    Address Resolution Protocol (ARP) is a very popular communication protocol in the local area network (LAN), working under the network layer, as per the open systems interconnection (OSI) model. ARP is used by computers ...
  • Phyu, Ei Ei; Moe, Khin Myat Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The demand of security is getting higher in these days due to easy reproduction of digitally created data. Digitally hide the secret information in some media content like digitized identification card, student’s registration ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Wai, Chit Hnin (University of Computer Studies, Yangon, 2022-06)
    Nowadays, communication is becoming more and more important to keep in touch with family and friends. Computer networks play a key role in this paper. To make this facilitating, Network engineers have used protocols ...
  • Latt, Win Zaw; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Education is an important part of human life and it is also valuable asset for career achievement. Nowadays, people gained certificates from the institution they had learnt and, those graduation documents are presented as ...
  • Mon, Ei Ei; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. The cloud allows users to avoid upfront ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Tun, Khin Myaing Myaing; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is recognized as an absolute need in application development. The healthcare sector deals with very sensitive data, patient’s medical records need to be kept confidential; hence, security is very important. ...
  • Thein, Khin Me Me; Nyunt, Thi Thi Soe; Aye, Kyar Nyo (International Journal of Advances in Electronics and Computer Science (IJAECS), 2017-02)
    In today’s world, real-time data or streaming data can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Big Data is also one of the hottest research ...
  • Soe, Naing Thura; Thant, Khin Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Dijkstra’s Algorithm solves the problem of finding the shortest path from a point (the source) to a destination. This problem is sometimes called the single-source shortest path problem. In these days, the world become ...
  • Soe, Thinn Lai (International Journal of Computer, 2013)
    Nowadays, there are so many increasing amount of information within world-wide web. For these increasing amounts of information, we need efficient and effective index structure when we have to find needed information. ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    XML (eXtensible Markup Language) and its schema language are becoming a primary data exchange format on the current web. In the next generation of the Semantic Web, the drawbacks of XML and its schema are appeared. ...
  • Tun, Thu Thu; Htoo, Nay Zar Chi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The Web is moving toward a collection of interoperating Web Services. Achieving this interoperability requires dynamic discovery of Web Services. This paper will develop a service repository that extends the UDDI registries ...
  • Nwe, San San; Kham, Nang Saing Moon (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social media has quickly become popular as an important means that people, organizations use to spread information of divert events for various purposes, ranging from business intelligence to nation security. However, the ...

Search Repository

Browse

My Account