UCSY's Research Repository

Browsing Faculty of Computer Systems and Technologies by Title

Browsing Faculty of Computer Systems and Technologies by Title

Sort by: Order: Results:

  • Zaw, Hnin Thiri; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the rapid advancement of network technology, the security of secret data is threatened because anyone may tend to intrude the system or eavesdrop via the communication channel. Most secret sharing schemes are based ...
  • Shwe, Lae Lae; Theint, Khant Kyawt Kyawt; Sein, Myint Myint; Thein, Thin Lai Lai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    3-D reconstruction of buildings in urban areas is one of the highlighted issues in photogrammetry, remote sensing, computer vision, and computer graphic. It can be used in various fields such as urban planning, construction, ...
  • Theint, Khant Kyawt Kyawt; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The system is aimed to develop the 3D building model of urban area with low resolution satellite images from Google earth that provides to create the three dimensional geographic information systems (GIS). In this ...
  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Aung, Thida; Sein, Myint Myint (International Conference on Genetic and Evolutionary Computing, 2017-10)
    Analysing the damage area is the critical task for recovery and reconstruction for the urban area after the disaster. The proposed method is developed to detect the damage areas after the disaster using the satellite ...
  • Yu, May The; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, an automatic image annotation and retrieval model is developed base on the intensity invariant approach. The given uncaptioned image is divided into background and foreground images and segmented ...
  • Win, Khaing Htet (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Although the numbers of researches are increased in natural language processing, the development of grammar checking system for Myanmar language is very few. Much of the researches in checking area depends on hand-crafted ...
  • Tun, Amy; Thein, Yadana (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As a potential key to defend illegal copying of digital multimedia objects, digital watermarking technology is now attracting significant awareness. With the help of a combined Lifting Wavelet Transform (LWT) and Discrete ...
  • Moe, Khaing Cho; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Rapid urbanization and urban growth is continuing to be one of the crucial issues of global change affecting physical dimensions of cities. In this study, building growth change detection is investigated as buildings ...
  • Aung, Thida; Moe, Khaing Cho; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is exposed to a number of natural hazards, some of which have caused devastating damage in the recent past. According to the UN Risk Model, Myanmar ranks as the ‘most at risk’ country for natural disasters. ...
  • Sein, Myint Myint; Yu, May The' (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Capturing of the digital images using multimedia devices and the digital cameras is becoming increasingly more popular. Annotating the digital pictures is important to support the browsing, i.e. search pattern and ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Aung, Thida; Sein, Myint Myint (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Detecting the damaged area is the critical task for recovery and reconstruction work. Traditional damage detection or change detection method focus on two dimensional changes detection, whereas the two dimensional ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...

Search Repository



Browse

My Account