UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Author "Mya, Khin Than"

Browsing International Conference on Computer Applications (ICCA) by Author "Mya, Khin Than"

Sort by: Order: Results:

  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Tint, Yawai; Mya, Khin Than (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting messages hidden using steganography. This paper proposes steganalysis of audio signal using Independent Component Analysis. A detection method is used for detecting ...
  • Mya, Khin Than; Tint, Yawai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. In this paper, techniques are presented which aim at the breaking of steganography usage in digital ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Htet, Hlwam Maint Htet; Mya, Khin Than (2019-02-27)
    Access control systems regulate the access to critical resources and they are vitally important for every organization’s IT infrastructure. Access controls authenticate and authorize individuals to access or deny the ...
  • Lei, Wyne Lei; Ishibashi, Yutaka; Mya, Khin Than (ICCA, 2021-02-25)
    In this paper, we examine the effect of prediction control in a remote haptic control system by Quality of Experience (QoE) assessment. In the system, a user operates a haptic interface device (just called a haptic device ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Lwin, Hay Mar Mo Mo; Ishibashi, Yutaka; Mya, Khin Than (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This paper clarifies the influence of the voice delay on human perception of group synchronization error in remote learning by subjective assessment. In our assessment, we produce the difference in output timing of ...
  • Oo, Hlaing Thida; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Internet of Things (IoT) is being used the physical sensors into smart sensors housing interfaces and data processing. The proposed system utilizes multi sensors in order to control and also provides user the ability ...
  • Oo, Hlaing Thida; Mya, Khin Than (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Internet of Things (IoT) is monitoring of the surrounding parameters and other several tiny devices connected together to the use of sensors that acquaint for wireless sensing of real time data and transfer them into the ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    For the contradictory issues of the transmission rate and flexibility in the current temperature system, this paper describes the design of a simple low cost microcontroller based real time monitoring. It deals with ...
  • Tint, Yawai; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The research on blind source separation is focus in the community of signal processing and has been developed in recent years. This paper proposes enhance audio steganalysis technique, which adopts Independent Component ...
  • Win, May Thu Zar; Maw, Aung Htein; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Segment Routing (SR) is an emerging technology to enforce the effective routing strategies without relying on signaling protocols. SR only needs to define the path information through the network at the ingress device ...
  • Win, May Thu Zar; Mya, Khin Than; Ishibashi, Yutaka (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Traditional per-flow routing increases communication complexity of both control and data planes because it requires a direct interaction between each node that is included in traffic paths and controller. Segment Routing ...
  • Htet, Thu Thu; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Steganalysis, the method to detect steganographically embedded hidden messages in digital data, has received an increasing interest in recent years. Although significant research efforts have been devoted to develop ...
  • Htet, Thu Thu; Mya, Khin Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Information hiding in video streams with the development of network and multimedia technologies has played an important role in the steganographical field, and correspondingly video stegnanlysis techniques are catching ...

Search Repository



Browse

My Account