Faculty of Computer Systems and Technologies Collection: Recent submissions

  • Htet, Thu Thu; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Steganalysis, the method to detect steganographically embedded hidden messages in digital data, has received an increasing interest in recent years. Although significant research efforts have been devoted to develop ...
  • Thein, Khant Kyaw Kyawt; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper handles a robust method to handle matching problem of the 3D building from remote sensed images, where two or more images are captured from the different views without any camera information. The system is ...
  • Moe, Khaing Cho; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Rapid urbanization and urban growth is continuing to be one of the crucial issues of global change affecting physical dimensions of cities. In this study, building growth change detection is investigated as buildings ...
  • Aung, Thida; Moe, Khaing Cho; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is exposed to a number of natural hazards, some of which have caused devastating damage in the recent past. According to the UN Risk Model, Myanmar ranks as the ‘most at risk’ country for natural disasters. ...
  • Shwe, Lae Lae; Theint, Khant Kyawt Kyawt; Sein, Myint Myint; Thein, Thin Lai Lai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    3-D reconstruction of buildings in urban areas is one of the highlighted issues in photogrammetry, remote sensing, computer vision, and computer graphic. It can be used in various fields such as urban planning, construction, ...
  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Tint, Yawai; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The research on blind source separation is focus in the community of signal processing and has been developed in recent years. This paper proposes enhance audio steganalysis technique, which adopts Independent Component ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Theint, Khant Kyawt Kyawt; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The system is aimed to develop the 3D building model of urban area with low resolution satellite images from Google earth that provides to create the three dimensional geographic information systems (GIS). In this ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • Win, Khaing Htet (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Although the numbers of researches are increased in natural language processing, the development of grammar checking system for Myanmar language is very few. Much of the researches in checking area depends on hand-crafted ...
  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...

Search Repository



Browse

My Account