UCSY's Research Repository

Browsing Faculty of Computer Systems and Technologies by Title

Browsing Faculty of Computer Systems and Technologies by Title

Sort by: Order: Results:

  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Aung, Thida; Sein, Myint Myint (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Detecting the damaged area is the critical task for recovery and reconstruction work. Traditional damage detection or change detection method focus on two dimensional changes detection, whereas the two dimensional ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...
  • Aung, Thida; Sein, Myint Myint (International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 2020-02)
    On 24th August 2016, the magnitude of a 6.8 earthquake struck in Bagan from the depth of 52 miles. This earthquake caused much damage in historic pagodas in Bagan, one of the archeological houses in Asia. Analyzing the ...
  • Thein, Khant Kyaw Kyawt; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper handles a robust method to handle matching problem of the 3D building from remote sensed images, where two or more images are captured from the different views without any camera information. The system is ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Proceedings of 2019 International Conference on Advanced Information technologies (ICAIT 2019), 2019-11-07)
    With the rapid growth of current network, the demand of resources is growing significantly. Insufficient bandwidth results unstable throughput in a network. Software-defined network (SDN) has been proposed to provide optimal ...
  • Lwin, Htar Htar; Aung, Wai Phyo (Proceedings of the First University Research Conference on Science and Engineering, 2020-01-23)
    This paper aims to analyze digital forensics of specific Android mobile financial applications such as m-banking and m-pay applications used in Myanmar. Some applications may store customer’s credentials on the phone’s ...
  • Khine, Myat Thiri; Sein, Myint Myint; Aung, Su Nandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Geographic query is composed of query keywords and a location. Spatial keyword queries which are queries on spatial objects associated with textual attributes have received significant attention in geographic ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Naing, Htet Htet; Aye, Zin May (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using ...
  • Oo, Hlaing Thida; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Internet of Things (IoT) is being used the physical sensors into smart sensors housing interfaces and data processing. The proposed system utilizes multi sensors in order to control and also provides user the ability ...
  • Oo, Hlaing Thida; Mya, Khin Than (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Internet of Things (IoT) is monitoring of the surrounding parameters and other several tiny devices connected together to the use of sensors that acquaint for wireless sensing of real time data and transfer them into the ...

Search Repository



Browse

My Account