UCSY's Research Repository

Browsing Faculty of Computer Systems and Technologies by Title

Browsing Faculty of Computer Systems and Technologies by Title

Sort by: Order: Results:

  • Hlaing, Wai Mar; Sein, Myint Myint (The 12th International Conference on Future Computer and Communication (ICFCC 2020), 2020-02-26)
    Neighbor Search with Hash Map Indexing Technique is used to get the high performance when the optimal path is searched in the complex networks. This system can also give advice the public bus passengers about the travel ...
  • Hlaing, Wai Mar; Liu, Shi-Jian; Pan, Jeng-Shyang (Journal of Internet Technology(JIT), 2019-11)
    A Novel graph approach named Combined Forward and Backward Heuristic Search (CFBHS) is proposed in this paper, which can be used to solve optimization problems in areas such as transportation and network routing. There ...
  • Phyo, K-zin; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Urban fire is one of the most ordinary problems in all nations. Fire can cause serious damages to people and properties. When the fire event occurred, it is extremely important to reach the fire vehicles to incident ...
  • Chaw, Hnin Thiri; Thuzar, Myat; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In recent year, the transportation networks are becoming more and more complex and navigation services are increasingly necessary for the people living in the modern society. One of the requirements in the cities of ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    For the contradictory issues of the transmission rate and flexibility in the current temperature system, this paper describes the design of a simple low cost microcontroller based real time monitoring. It deals with ...
  • Aung, Thida; Sein, Myint Myint; Hama, Hiromitsu (IEEE 7th Global Conference on Consumer Electronics, 2018-10-18)
    The reconstruction of the damaged historical building, pagoda and temple is a critical task in disaster recovering process. In Myanmar, many pagodas are destroyed due to the earthquake. In this research, 3D reconstruction ...
  • Hlaing, Wai Mar; Sein, Myint Myint (The Seventh International Conference on Science and Engineering 2016, (ICSE 2016), 2016-12-10)
    Nowadays, people widespread use of smartphones and ubiquitous devices for map based services. As the transport network is complicated and massive, people may be confused to reach the desired location after finding ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...
  • Aung, Cho Cho; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Thet, Khaing Zin; Mya, Khin Than (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Information technology plays a vital role for the development of smart cards. Smart cardscan change the form of the delivery of services and goods, through the automatedidentification and verification of customers, ...
  • Tint, Yawai; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The research on blind source separation is focus in the community of signal processing and has been developed in recent years. This paper proposes enhance audio steganalysis technique, which adopts Independent Component ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Proceedings of 10th International Conference on Science and Engineering 2019, (ICSE 2019), 2019-12-08)
    The recent developments in existing network infrastructure need high bandwidth capacity and multiple paths between high-end switches. Software-Defined Networking (SDN) provides QoS for network flows. Statistics measurement ...
  • Win, May Thu Zar; Mya, Khin Than; Ishibashi, Yutaka (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Traditional per-flow routing increases communication complexity of both control and data planes because it requires a direct interaction between each node that is included in traffic paths and controller. Segment Routing ...
  • Htet, Thu Thu; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Steganalysis, the method to detect steganographically embedded hidden messages in digital data, has received an increasing interest in recent years. Although significant research efforts have been devoted to develop ...
  • Htet, Thu Thu; Mya, Khin Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Information hiding in video streams with the development of network and multimedia technologies has played an important role in the steganographical field, and correspondingly video stegnanlysis techniques are catching ...

Search Repository



Browse

My Account