Browsing by Title

Sort by: Order: Results:

  • Win, Ei Shwe Sin; Mon, Myat Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper to protect copyright, ownership and content integrity of digital media including digital watermarking techniques. The primary motivation of this article is to study the principles of cryptographic primitives ...
  • Lwin, Thin Yu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The modern era is of digitalization and thus we want to transmit large data in limited bandwidth. Today a variety of computer, scientific and engineering application have difficulty to store and transmit the large size ...
  • Reen, Mau; Khaing, Khathy (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image compression is very important in many applications, especially for progressive transmission, image browsing, multimedia applications. Image contains large amounts of information that requires much storage space, ...
  • Thant, Wut Yee; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, we propose a support vector machines (SVMs) method of classifying image regions hierarchically based on their semantics rather than on low-level features. First, image regions are segmented using the ...
  • Thu, May Phyo; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has ...
  • Khaing, May Thet; Aye, Zin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Aung, Yi Yi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Win, Htwe Pa Pa; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image enhancement processing step is the basic crucial part of the OCR system as the recognition accuracy of OCR systems greatly depends on the quality of the input text image. Most of the OCR systems, especially Myanmar ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Htwe, Ah Nge; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image resampling is a process which change the size of an image. It generates output image of the specified dimension with the help of the interpolation techniques. The up-sampled images are lost fine detailed information ...
  • Oo, Shwe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Content-based image retrieval (CBIR) is the uses of visual features of the image, such as color, texture, shape, match the query image and database, return similar image to the user. Color is the most significant feature ...
  • Htwe, Ah Nge; Nge, Mi Mi (International Conference on e-Business (iNCEB), 2009-10)
    Image zooming is a vital role in image processing. The zoomed images can be distorted because of blocky or jaggy effects. Sometimes, there is a problem to define the content of image or photo. The distorted image is needed ...
  • Moe, Myint Myint; Oo, Khine Khine (Proceedings of the Tenth International Conference on Science and Engineering (ICSE 2019), 2019-12-07)
    Test-driven development (TDD) is a foundation for software evolution but unit tests must be performed before production code. To enhance both external code quality and programmers’ productivity can be insisted on the ...
  • Thant, Lwin May; Phyu, Sabai (ICCA, 2021-02-25)
    In a medical problem, investigation of powerful new tools is involved in essential role of high-throughput sequencing technologies. Microarray data sequencers produced a large and complex sets of data for the advancement ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Aye, Saw Mya; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Voice over Internet Protocol (VoIP) is one of the quickest developing Internet services and steadily replaces traditional telephony. VoIP application provides a means of transmitting voice communication over an IP based ...

Search Repository

Browse

My Account