Oo, Mi Khine; Khine, May Aye(International Journal on Natural Language Computing (IJNLC), 2019-12)
The tremendous increase in the amount of available research documents impels researchers to propose
topic models to extract the latent semantic themes of a documents collection. However, how to extract the
hidden topics ...
Oo, Mi Khine; Khine, May Aye(IEEE 7th Global Conference on Consumer Electronics (IEEE GCCE 2018), Nara, JAPAN, 2018-10)
Efficient extraction of useful information is a
rising problem in Big data, since the amount of information
being gathered across various domains grows with an increasing
rate. So, it takes more time to understand ...
Oo, Mi Khine; Khaing, Myo Kay(14th International Conference on Computer Applications (ICCA 2016), Yangon, MYANMAR, 2016-02)
Under the explosive increase of global data,
the term Big data is mainly used to describe
enormous datasets. With the availability of
increasingly large quantities of digital
information, it is becoming more difficult ...
Win, Eaint Mon; Khine, May Aye(Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
Community detection is one of the most important research area wherein invention and growth
of social networks. Community is a set of members densely connected within a group and sparely connected
with the other groups. ...
Aung, Tun Myat; Hla, Ni Ni(IEEE Proceeding of ICCCI 2019, 2019-09-02)
The rapid development of electronic exchange of
digital information increases the importance of information
security in storage and transmission of data on public
communication network. Cryptography has emerged as ...
Aung, Tun Myat; Hla, Ni Ni(IEEE Proceeding of ICCCI 2019, 2019-09-02)
Network security is a general idea to ensure
information transmission over PC and portable systems. Elliptic
curve cryptosystems are nowadays widely used in public
communication channels for network security. Their ...
Aung, Tun Myat; Naing, Htet Htet; Hla, Ni Ni(International Journal of Machine Learning and Computing, 2019-06)
Fast progression of digital data exchange in
electronic way, information security is becoming much more
important in data storage and transmission on public
communication networks. Cryptography has come up as a
solution ...
Hla, Ni Ni; Aung, Tun Myat(Journal of Communications, 2019-04)
Elliptic curve cryptosystems are nowadays widely
used in public communication channels for network security.
Their security depends on the complexity of solving the elliptic
curve discrete logarithm problem. But, there ...
Hla, Ni Ni; Aung, Tun Myat(Advances in Intelligent Systems and Computing (IEMIS 2018 Vol. 1), 2018-12-12)
At the beginning the paper describes the basic properties of finite field
arithmetic and elliptic curve arithmetic over prime and binary fields. Then it discusses
the elliptic curve discrete logarithm problem and its ...
Aung, Tun Myat; Myint, Kaung Htet; Hla, Ni Ni(Advances in Intelligent Systems and Computing (ICO 2018), 2018-09-28)
Short Message Service (SMS) is a text messaging service component
of mobile communication systems. It uses standardized communications protocols to exchange short text between mobile devices. SMS does not have any
built-in ...
Aung, Tun Myat; Hla, Ni Ni(International Journal of Information, Control and Computer Sciences, 2017-11)
This paper begins by describing basic properties of
finite field and elliptic curve cryptography over prime field and
binary field. Then we discuss the discrete logarithm problem for
elliptic curves and its properties. ...
Aung, Tun Myat; Hla, Ni Ni(International Journal of Engineering Research & Technology (IJERT), 2017-08)
The security of elliptic curve cryptosystems depends on
the difficulty of solving the Elliptic Curve Discrete Log Problem
(ECDLP). Elliptic curves with large group order are used for
elliptic curve cryptosystems not to ...
Hla, Ni Ni; Aung, Tun Myat(International Journal of Engineering Research & Technology (IJERT), 2017-08)
Many cryptographic protocols are based on the
difficulty of factoring large composite integers or a related
problem. Therefore, we implement the finite field arithmetic
operations for large prime and binary fields by ...
Aung, Tun Myat; Hla, Ni Ni(Proceeding of Symbolic Computation and Cryptolog, 2008)
In this paper we propose the construction of nonlinear
pseudorandom sequence from the group of points over an elliptic curve. This
method is based on an elliptic curve (EC), a linear feedback shift register and a
random ...
Hlaing, Hnin Ei Ei; Khine, May Aye(Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
Mining frequent patterns is an important component of many prediction systems. One common usage in web applications is the mining of users’ access behavior for the purpose of predicting and hence pre-fetching the web pages ...
Khine, May Aye; Nu, Than Than(Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
A linear programming model is built to explore the possibilities of optimizing farm returns, consider-ing crop activities for selected crop region. To deter-mine the optimum organization of crops, three dis-tricts in ...
Linn, Naing; Khine, May Aye(Third Local Conference on Parallel and Soft Computing, 2009-08-03)
Security aspects come into play when it is necessary
or describe to protect the information transmission. The goal of
cryptography is to make it possible for two people to exchange a
message in such a way that other ...
Myint, Kyaw Phone; Khine, May Aye(Third Local Conference on Parallel and Soft Computing, 2009-08-03)
Case-Base Reasoning (CBR) system is an
artificial intelligent approach to learning and problem solving
based on last experiences. The knowledge of case adaption is
used to guide the retrieval process. Possible adaption ...
Myo, Nan Kathy; Khine, May Aye(Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
The healthcare industry collects huge amount of healthcare data which, unfortunately, are not mine for discover relation and hidden information for effective decision making. Advance data mining techniques can help remedy ...
Hein, Pyae Sandi; Khine, May Aye(Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
Clustering (or cluster analysis) is one of the main data analysis techniques and deals with the organization of a set of objects in a multidimensional space into cohesive groups, called clusters. Each cluster contains ...