UCSY's Research Repository

Browsing Faculty of Computing by Title

Browsing Faculty of Computing by Title

Sort by: Order: Results:

  • Myint, Kyaw Phone; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-Base Reasoning (CBR) system is an artificial intelligent approach to learning and problem solving based on last experiences. The knowledge of case adaption is used to guide the retrieval process. Possible adaption ...
  • Aung, Tun Myat; Hla, Ni Ni (IEEE Proceeding of ICCCI 2019, 2019-09-02)
    Network security is a general idea to ensure information transmission over PC and portable systems. Elliptic curve cryptosystems are nowadays widely used in public communication channels for network security. Their ...
  • Aung, Tun Myat; Hla, Ni Ni (IEEE Proceeding of ICCCI 2019, 2019-09-02)
    The rapid development of electronic exchange of digital information increases the importance of information security in storage and transmission of data on public communication network. Cryptography has emerged as ...
  • Aung, Tun Myat; Naing, Htet Htet; Hla, Ni Ni (International Journal of Machine Learning and Computing, 2019-06)
    Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission on public communication networks. Cryptography has come up as a solution ...
  • Oo, Mi Khine; Khine, May Aye (IEEE 7th Global Conference on Consumer Electronics (IEEE GCCE 2018), Nara, JAPAN, 2018-10)
    Efficient extraction of useful information is a rising problem in Big data, since the amount of information being gathered across various domains grows with an increasing rate. So, it takes more time to understand ...
  • Aung, Tun Myat; Myint, Kaung Htet; Hla, Ni Ni (Advances in Intelligent Systems and Computing (ICO 2018), 2018-09-28)
    Short Message Service (SMS) is a text messaging service component of mobile communication systems. It uses standardized communications protocols to exchange short text between mobile devices. SMS does not have any built-in ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • Hlaing, Khin Nilar; Khine, May Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The timely procurement and delivery of materials / equipment to yard, site and assembly locations requires a huge team effort and is paramount for the successful work done for shipyards and construction sites.The ERRP ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Hla, Ni Ni; Aung, Tun Myat (Journal of Communications, 2019-04)
    Elliptic curve cryptosystems are nowadays widely used in public communication channels for network security. Their security depends on the complexity of solving the elliptic curve discrete logarithm problem. But, there ...
  • Hlaing, Thuzar; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    To avoid high computational costs in identifying intrusions by IDSs, the size of a dataset needs to be reduced. Feature selection is considered a problem of global combinatorial optimization in machine learning, which ...
  • Myint, Aye Nandar; Khine, May Aye; Khaing, Myo Kay (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, forecasting of exchange rates plays an important role in international economics. Additional to basic economic and financial news, investors and traders employ in their decision process technical tools to ...
  • Aung, Tun Myat; Hla, Ni Ni (International Journal of Engineering Research & Technology (IJERT), 2017-08)
    The security of elliptic curve cryptosystems depends on the difficulty of solving the Elliptic Curve Discrete Log Problem (ECDLP). Elliptic curves with large group order are used for elliptic curve cryptosystems not to ...
  • Hla, Ni Ni; Aung, Tun Myat (International Journal of Engineering Research & Technology (IJERT), 2017-08)
    Many cryptographic protocols are based on the difficulty of factoring large composite integers or a related problem. Therefore, we implement the finite field arithmetic operations for large prime and binary fields by ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Hlaing, Hnin Ei Ei; Khine, May Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Mining frequent patterns is an important component of many prediction systems. One common usage in web applications is the mining of users’ access behavior for the purpose of predicting and hence pre-fetching the web pages ...
  • Wai, Ei Phyo; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Face recognition has become one of the most important fields in automated biometric identification system [1].The face is our primary focus of attention in social intercourse, playing a major role in biometric security ...
  • Khine, May Aye; Nu, Than Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A linear programming model is built to explore the possibilities of optimizing farm returns, consider-ing crop activities for selected crop region. To deter-mine the optimum organization of crops, three dis-tricts in ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Myo, Nan Kathy; Khine, May Aye (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    The healthcare industry collects huge amount of healthcare data which, unfortunately, are not mine for discover relation and hidden information for effective decision making. Advance data mining techniques can help remedy ...

Search Repository



Browse

My Account