UCSY's Research Repository

Browsing Faculty of Computer Systems and Technologies by Title

Browsing Faculty of Computer Systems and Technologies by Title

Sort by: Order: Results:

  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Aung, Thida; Sein, Myint Myint (International Conference on Genetic and Evolutionary Computing, 2017-10)
    Analysing the damage area is the critical task for recovery and reconstruction for the urban area after the disaster. The proposed method is developed to detect the damage areas after the disaster using the satellite ...
  • Yu, May The; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, an automatic image annotation and retrieval model is developed base on the intensity invariant approach. The given uncaptioned image is divided into background and foreground images and segmented ...
  • Win, Khaing Htet (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Although the numbers of researches are increased in natural language processing, the development of grammar checking system for Myanmar language is very few. Much of the researches in checking area depends on hand-crafted ...
  • Tun, Amy; Thein, Yadana (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As a potential key to defend illegal copying of digital multimedia objects, digital watermarking technology is now attracting significant awareness. With the help of a combined Lifting Wavelet Transform (LWT) and Discrete ...
  • Moe, Khaing Cho; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Rapid urbanization and urban growth is continuing to be one of the crucial issues of global change affecting physical dimensions of cities. In this study, building growth change detection is investigated as buildings ...
  • Aung, Thida; Moe, Khaing Cho; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is exposed to a number of natural hazards, some of which have caused devastating damage in the recent past. According to the UN Risk Model, Myanmar ranks as the ‘most at risk’ country for natural disasters. ...
  • Sein, Myint Myint; Yu, May The' (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Capturing of the digital images using multimedia devices and the digital cameras is becoming increasingly more popular. Annotating the digital pictures is important to support the browsing, i.e. search pattern and ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Aung, Thida; Sein, Myint Myint (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Detecting the damaged area is the critical task for recovery and reconstruction work. Traditional damage detection or change detection method focus on two dimensional changes detection, whereas the two dimensional ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...
  • Aung, Thida; Sein, Myint Myint (International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 2020-02)
    On 24th August 2016, the magnitude of a 6.8 earthquake struck in Bagan from the depth of 52 miles. This earthquake caused much damage in historic pagodas in Bagan, one of the archeological houses in Asia. Analyzing the ...
  • Thein, Khant Kyaw Kyawt; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper handles a robust method to handle matching problem of the 3D building from remote sensed images, where two or more images are captured from the different views without any camera information. The system is ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Proceedings of 2019 International Conference on Advanced Information technologies (ICAIT 2019), 2019-11-07)
    With the rapid growth of current network, the demand of resources is growing significantly. Insufficient bandwidth results unstable throughput in a network. Software-defined network (SDN) has been proposed to provide optimal ...

Search Repository



Browse

My Account