UCSY's Research Repository

Browsing by Issue Date

Browsing by Issue Date

Sort by: Order: Results:

  • Thwin, Mie Mie Thet; Quah, Tong Seng (Proceedings of the First International Conference on Information Technology and Applications (ICITA 2002), 2002)
    In this paper, we explore the behaviour of neural network in predicting software readiness. Our neural network model aims to predict the number of faults (including objectoriented faults) of a software under development. ...
  • Thwin, Mie Mie Thet; Quah, Tong Seng (Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02, 2002-11-22)
    In this paper, we present the application of neural network for predicting software development faults including object-oriented faults. Object-oriented metrics can be used in quality estimation. In practice, quality ...
  • Thwin, Mie Mie Thet; Quah, Tong Seng (Proceedings of the International Conference on Software Maintenance (ICSM 2003), 2003)
    This paper presents the application of neural networks in software quality estimation using object-oriented metrics. Quality estimation includes estimating reliability as well as maintainability of a software. Reliability ...
  • Thwin, Mie Mie Thet; Quah, Tong Seng (Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003-07-01)
    This paper presents the application of neural networks in software maintainability estimation using objectoriented metrics. Maintenance effort can be measured as the number of lines changed per class. In this paper, ...
  • Thwin, Mie Mie Thet; Quah, Tong Seng (Information and Software Technology, 2004-06-15)
    Database application constitutes one of the largest and most important software domains in the world. Some classes or modules in such applications are responsible for database operations. Structured Query Language (SQL) ...
  • Thwin, Mie Mie Thet; Quah, Tong Seng (Journal of Systems and Software, 2005-05)
    This paper presents the application of neural networks in software quality estimation using object-oriented metrics. In this paper, two kinds of investigation are performed. The first on predicting the number of defects ...
  • Thwin, Mie Mie Thet; Quah, Tong Seng (Enginnering Letters, 2007-05)
    Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discovered in testing, software managers can ...
  • Aung, Tun Myat; Hla, Ni Ni (Proceeding of Symbolic Computation and Cryptolog, 2008)
    In this paper we propose the construction of nonlinear pseudorandom sequence from the group of points over an elliptic curve. This method is based on an elliptic curve (EC), a linear feedback shift register and a random ...
  • Htoon, Htoon; Thwin, Mie Mie Thet (Proceedings of the 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2008-05-14)
    A mobile agent is an executing program that can migrate during execution from machine to machine in a heterogeneous network. On each machine, the agent interacts with stationary service agents and other resources ...
  • Aye, Moe Moe; Thwin, Mie Mie Thet (Proceedings of the 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2008-05-14)
    This paper presents a case study namely Mobile Agent Based Online Examination System and the roles of mobile agents used in the system. The system provides the infrastructure for conducting computer-based examination which ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Aung, Kyaw Htet; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Wireless technology , by its nature , violates fundamental security principles. Wireless messages move through the free-space environment on certain spectrum allocations, it is vulnerable to security threats. Common ...
  • Zaw, Myo Min; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The implementation of a helicopter descending and landing control system is presented. Descending and landing is to maintain the glide slope and heading and to reduce gradually airspeed and height from a point of altitude ...
  • Htun, Sai Zaw Moe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper studies the Minimum Spanning Tree Methods. A graph is a collection of nodes and edges, but has no rules dictating the connection among the nodes. All trees are graphs. A tree is a special case of graph in ...
  • Oo, San Naing; Tun, Myat Thuzar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Traditionally, the routing problem has been a single objective problem having as goal the minimization of either the total distance or travel time. Many approached and strategies are used for an appropriate solution to ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Aung, Ei Mon Mon; Min, Mar Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Voice Activity Detection (VAD) is used to detect the presence of speech in an audio signal. VAD plays an important role as a preprocessing stage in numerous audio processing applications. In Voice over IP (VoIP) and ...
  • Tun, Nyan Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Information and access to information is important in modern society. Network security is necessary to counter the threats and make network safe to use. There are some methods to prevent eavesdropping or falsification ...
  • Aung, Htike Htet; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Graphs have been used in a wide variety of application. Some of these applications are analysis of electrical circuits, finding shortest routes, project planning, and identification of chemical compounds, statistical ...
  • Win, Than Htun; Hnin, Mya Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents an algorithm which extends the fuzzy k-means algorithm for clustering categorical objects. In this algorithm, use a simple matching dissimilarity measure to deal with categorical objects and uses a ...

Search Repository

Browse

My Account