Browsing by Title

Sort by: Order: Results:

  • Aung, May Aye Chan; Thant, Khin Phyo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As the internet evolves and computer networks become bigger and bigger, network security is one of the most challenging issues in today's world that touches many areas using network communication. Nowadays, there is a ...
  • Myint, Sharr Wint Yee; Oo, Twe Ta (University of Computer Studies, Yangon, 2019-03)
    The development in digital technologies and advanced speech analysis/synthesis tools these days enable speech signals to be tampered without leaving any perceptual clues. As an important information carrier, the integrity ...
  • Myint, Hla Hla; Aung, Soe Lin (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    In medical image processing, segmentation of the internal structure of brain is the fundamental task. The precise segmentation of brain tumor has great impact on diagnosis, monitoring, treatment planning for patients. Various ...
  • Zaw, Yu Mon; Nwe, Khine Moe (Proceedings of the 10th International Conference on Science and Engineering (ICSE 2019), 2019-12-07)
    Cloud computing is the on-demand availability of computer system resources and services over the internet and cloud data centers play important role in fulfilling on-demand facilities such as servers, communication media ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, scheduling problems such as employee scheduling, university timetabling, arise in almost all areas of human activity. In the literature, there are many methods to solve it. Some of the most effective techniques ...
  • Thwel, Tin Thein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As the amounts of storage utilization become the vast, people are being encountered out of storage space in almost every situation. Therefore, they tried to find out the efficient ways to safe storage space. The single ...
  • Tun, Thant Zin; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Cloud data centers offer utility-oriented IT services to users worldwide. The nature of resource demand of cloud data centers is elastic as the overall workloads are always changing. For handling dynamic workload nature ...
  • Myint, Zin Thu Thu; Tun, Myint Thu Zar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Personal Learning Environment (PLE) technology is centered on the concept of self-regulated learning that creates responsible learners, who are capable of critical thinking and able to plan their own learning processes. ...
  • Sone, Aye Pyae; Nwe, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web page typically contains many information blocks. They are navigation panels, copyright and privacy notices and advertisements. These blocks are useful for business purposes. These blocks are called as the noisy ...
  • Nandar, Hsu Myat (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Cryptography is one of the most important sciences in the current area. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Nge, Khin Hnin; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper is represented for information security by using cryptography on important message and image steganography method on digital image. The secure system is implemented by combining for the encrypted message and ...
  • Soe, Akari Myint; Cho, Zarli (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The Internet as a whole does not use secure links, thus information in transit may be susceptible to interception as well. The important of reducing a chance of the information being detected during the transmission is ...
  • Thaung, Thein Than; Htike, Win Win (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Steganography is the art of hidden information in other information when communication is taking place. Many different carrier file format can be used, but audio waves are the most difficult and more secure because audio ...
  • Oo, Zin War; Oo, Khine Khine (ICCA, 2021-02-25)
    Emotional health is very important to build our life. Emotional health is equally as important as our physical health. Dealing with our emotions is a difficult task because we can’t see them. To analysis emotional state ...
  • Htet, Thu Zar (ICCA, 2021-02-25)
    In recent years, company is necessary to forecast churn customers in order to retain customers. Customer attrition is a crucial problem that every business must make the utmost effort to prevent. Employee churn or loss of ...
  • Khaing, Thal Ei; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Digital image encryption/decryption is to transform a meaningful image into a meaningless or disordered image in order to enhance the power to resist invalid attack and in turn enhance the security. This paper presents a ...
  • Myint, Phyo Wah Wah; Hlaing, Swe Zin; Htoon, Ei Chaw (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Cloud computing is a rising area within the field of Information Technology (IT). It has a potential for cost savings to the enterprises but the security risk are also enormous. In cloud environment, sensitive data or ...
  • Wai, Hnin Yu; Nwe, Khine Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, it is important that information is sent confidentially over the network without fear of hackers or unauthorized access to it. Cryptography was created as a technique for securing the secrecy of communication ...

Search Repository

Browse

My Account