UCSY's Research Repository

Browsing Faculty of Computer Systems and Technologies by Title

Browsing Faculty of Computer Systems and Technologies by Title

Sort by: Order: Results:

  • Aung, Thida; Moe, Khaing Cho; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is exposed to a number of natural hazards, some of which have caused devastating damage in the recent past. According to the UN Risk Model, Myanmar ranks as the ‘most at risk’ country for natural disasters. ...
  • Sein, Myint Myint; Yu, May The' (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Capturing of the digital images using multimedia devices and the digital cameras is becoming increasingly more popular. Annotating the digital pictures is important to support the browsing, i.e. search pattern and ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Aung, Thida; Sein, Myint Myint (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Detecting the damaged area is the critical task for recovery and reconstruction work. Traditional damage detection or change detection method focus on two dimensional changes detection, whereas the two dimensional ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...
  • Aung, Thida; Sein, Myint Myint (International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 2020-02)
    On 24th August 2016, the magnitude of a 6.8 earthquake struck in Bagan from the depth of 52 miles. This earthquake caused much damage in historic pagodas in Bagan, one of the archeological houses in Asia. Analyzing the ...
  • Thein, Khant Kyaw Kyawt; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper handles a robust method to handle matching problem of the 3D building from remote sensed images, where two or more images are captured from the different views without any camera information. The system is ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Proceedings of 2019 International Conference on Advanced Information technologies (ICAIT 2019), 2019-11-07)
    With the rapid growth of current network, the demand of resources is growing significantly. Insufficient bandwidth results unstable throughput in a network. Software-defined network (SDN) has been proposed to provide optimal ...
  • Lwin, Htar Htar; Aung, Wai Phyo (Proceedings of the First University Research Conference on Science and Engineering, 2020-01-23)
    This paper aims to analyze digital forensics of specific Android mobile financial applications such as m-banking and m-pay applications used in Myanmar. Some applications may store customer’s credentials on the phone’s ...
  • Khine, Myat Thiri; Sein, Myint Myint; Aung, Su Nandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Geographic query is composed of query keywords and a location. Spatial keyword queries which are queries on spatial objects associated with textual attributes have received significant attention in geographic ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...

Search Repository



Browse

My Account