UCSY's Research Repository

Browsing by Issue Date

Browsing by Issue Date

Sort by: Order: Results:

  • Aung, Tun Myat; Hla, Ni Ni (Proceeding of Symbolic Computation and Cryptolog, 2008)
    In this paper we propose the construction of nonlinear pseudorandom sequence from the group of points over an elliptic curve. This method is based on an elliptic curve (EC), a linear feedback shift register and a random ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Aung, Kyaw Htet; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Wireless technology , by its nature , violates fundamental security principles. Wireless messages move through the free-space environment on certain spectrum allocations, it is vulnerable to security threats. Common ...
  • Zaw, Myo Min; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The implementation of a helicopter descending and landing control system is presented. Descending and landing is to maintain the glide slope and heading and to reduce gradually airspeed and height from a point of altitude ...
  • Htun, Sai Zaw Moe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper studies the Minimum Spanning Tree Methods. A graph is a collection of nodes and edges, but has no rules dictating the connection among the nodes. All trees are graphs. A tree is a special case of graph in ...
  • Oo, San Naing; Tun, Myat Thuzar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Traditionally, the routing problem has been a single objective problem having as goal the minimization of either the total distance or travel time. Many approached and strategies are used for an appropriate solution to ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Aung, Ei Mon Mon; Min, Mar Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Voice Activity Detection (VAD) is used to detect the presence of speech in an audio signal. VAD plays an important role as a preprocessing stage in numerous audio processing applications. In Voice over IP (VoIP) and ...
  • Tun, Nyan Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Information and access to information is important in modern society. Network security is necessary to counter the threats and make network safe to use. There are some methods to prevent eavesdropping or falsification ...
  • Aung, Htike Htet; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Graphs have been used in a wide variety of application. Some of these applications are analysis of electrical circuits, finding shortest routes, project planning, and identification of chemical compounds, statistical ...
  • Win, Than Htun; Hnin, Mya Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents an algorithm which extends the fuzzy k-means algorithm for clustering categorical objects. In this algorithm, use a simple matching dissimilarity measure to deal with categorical objects and uses a ...
  • Maung, Tin Win; Thein, Thandar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today’s connected society requires secure information system to preserve data privacy and authentication un critical applications. This paper intends to implement secure information system for critical applications. The ...
  • Aung, Theingi Nwe; Hlaing, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    With the rapid advances in security threads, more reliable security techniques have become the business necessity. The security services must assure that the communication is not refered with in such a way that the party ...
  • Swe, Kyaw Ei Ei; Aung, Sint Sint (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cluster is refers to identifying the number of subclasses of c-clusters (2d” cd” n). There are two kinds of c partition of data: hard (or crisp) and soft (or fuzzy) . Two important issues are to consider how to measure ...
  • Htwe, Nyo Nyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system is implemented to improve the clarity of audio echo speech signal. Acoustic echo cancellation (AEC) greatly enhances the audio quality of loudspeaker enclosure microphone (LEM) system. The presented ...
  • Thura, Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Two secure end users want to communicate over an insecure channel. The enemy user is an outsider, listening to attack the communication. Encryption is the converting readable information as “plain text” into ...
  • Thein, Si Thu Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is very important role for information and data. Data communication is the most important in the world. Communication technology is increased as well as an authorized person can intercept the security ...
  • Htet, Yi Mon; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Encryption is used to securely transmit data in open networks. It can also be defined as the process of obscuring information to make it unreasonable without special knowledge. Encryption is the process of transformation ...
  • Kyi, Linn Htaik; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In the rapid improvement of communication environment, it is desirable to improve the security measure on the use of between the sender and receiver. Cryptography is an important aspect of communications security and ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...

Search Repository

Browse

My Account