Faculty of Computer Systems and Technologies: Recent submissions

  • Hlaing, Wai Mar; Liu, Shi-Jian; Pan, Jeng-Shyang (Journal of Internet Technology(JIT), 2019-11)
    A Novel graph approach named Combined Forward and Backward Heuristic Search (CFBHS) is proposed in this paper, which can be used to solve optimization problems in areas such as transportation and network routing. There ...
  • Hlaing, Wai Mar; Sein, Myint Myint (The 12th International Conference on Future Computer and Communication (ICFCC 2020), 2020-02-26)
    Neighbor Search with Hash Map Indexing Technique is used to get the high performance when the optimal path is searched in the complex networks. This system can also give advice the public bus passengers about the travel ...
  • Hlaing, Wai Mar; Sein, Myint Myint (2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), 2018-12-13)
    This paper aims to support the most suitable route for passengers of the taxi system using the proposed heuristic search method. Furthermore, k-Means Nearest Point Search (kMNPS) algorithm is proposed to produce the ...
  • Hlaing, Wai Mar; Sein, Myint Myint (The Seventh International Conference on Science and Engineering 2016, (ICSE 2016), 2016-12-10)
    Nowadays, people widespread use of smartphones and ubiquitous devices for map based services. As the transport network is complicated and massive, people may be confused to reach the desired location after finding ...
  • Aung, Thida; Sein, Myint Myint (International Conference on Genetic and Evolutionary Computing, 2017-10)
    Analysing the damage area is the critical task for recovery and reconstruction for the urban area after the disaster. The proposed method is developed to detect the damage areas after the disaster using the satellite ...
  • Aung, Thida; Sein, Myint Myint (International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 2020-02)
    On 24th August 2016, the magnitude of a 6.8 earthquake struck in Bagan from the depth of 52 miles. This earthquake caused much damage in historic pagodas in Bagan, one of the archeological houses in Asia. Analyzing the ...
  • Aung, Thida; Sein, Myint Myint; Hama, Hiromitsu (IEEE 7th Global Conference on Consumer Electronics, 2018-10-18)
    The reconstruction of the damaged historical building, pagoda and temple is a critical task in disaster recovering process. In Myanmar, many pagodas are destroyed due to the earthquake. In this research, 3D reconstruction ...
  • Naing, Htet Htet; Aye, Zin May (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using ...
  • Lwin, Htar Htar; Aung, Wai Phyo (Proceedings of the First University Research Conference on Science and Engineering, 2020-01-23)
    This paper aims to analyze digital forensics of specific Android mobile financial applications such as m-banking and m-pay applications used in Myanmar. Some applications may store customer’s credentials on the phone’s ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Proceedings of 10th International Conference on Science and Engineering 2019, (ICSE 2019), 2019-12-08)
    The recent developments in existing network infrastructure need high bandwidth capacity and multiple paths between high-end switches. Software-Defined Networking (SDN) provides QoS for network flows. Statistics measurement ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Proceedings of 2019 International Conference on Advanced Information technologies (ICAIT 2019), 2019-11-07)
    With the rapid growth of current network, the demand of resources is growing significantly. Insufficient bandwidth results unstable throughput in a network. Software-defined network (SDN) has been proposed to provide optimal ...
  • Aung, Cho Cho; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Kyi, Linn Htaik; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In the rapid improvement of communication environment, it is desirable to improve the security measure on the use of between the sender and receiver. Cryptography is an important aspect of communications security and ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...

Search Repository



Browse

My Account