UCSY's Research Repository

Browsing Faculty of Computing by Title

Browsing Faculty of Computing by Title

Sort by: Order: Results:

  • Aung, Tun Myat; Hla, Ni Ni (International Journal of Engineering Research & Technology (IJERT), 2017-08)
    The security of elliptic curve cryptosystems depends on the difficulty of solving the Elliptic Curve Discrete Log Problem (ECDLP). Elliptic curves with large group order are used for elliptic curve cryptosystems not to ...
  • Hla, Ni Ni; Aung, Tun Myat (International Journal of Engineering Research & Technology (IJERT), 2017-08)
    Many cryptographic protocols are based on the difficulty of factoring large composite integers or a related problem. Therefore, we implement the finite field arithmetic operations for large prime and binary fields by ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Hlaing, Hnin Ei Ei; Khine, May Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Mining frequent patterns is an important component of many prediction systems. One common usage in web applications is the mining of users’ access behavior for the purpose of predicting and hence pre-fetching the web pages ...
  • Wai, Ei Phyo; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Face recognition has become one of the most important fields in automated biometric identification system [1].The face is our primary focus of attention in social intercourse, playing a major role in biometric security ...
  • Khine, May Aye; Nu, Than Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A linear programming model is built to explore the possibilities of optimizing farm returns, consider-ing crop activities for selected crop region. To deter-mine the optimum organization of crops, three dis-tricts in ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Myo, Nan Kathy; Khine, May Aye (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    The healthcare industry collects huge amount of healthcare data which, unfortunately, are not mine for discover relation and hidden information for effective decision making. Advance data mining techniques can help remedy ...
  • Aung, Tun Myat; Hla, Ni Ni (Proceeding of Symbolic Computation and Cryptolog, 2008)
    In this paper we propose the construction of nonlinear pseudorandom sequence from the group of points over an elliptic curve. This method is based on an elliptic curve (EC), a linear feedback shift register and a random ...
  • Oo, Mi Khine; Khaing, Myo Kay (14th International Conference on Computer Applications (ICCA 2016), Yangon, MYANMAR, 2016-02)
    Under the explosive increase of global data, the term Big data is mainly used to describe enormous datasets. With the availability of increasingly large quantities of digital information, it is becoming more difficult ...
  • Aung, Tun Myat; Hla, Ni Ni (International Journal of Information, Control and Computer Sciences, 2017-11)
    This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. ...
  • Win, Eaint Mon; Khine, May Aye (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    Community detection is one of the most important research area wherein invention and growth of social networks. Community is a set of members densely connected within a group and sparely connected with the other groups. ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In today digital age, there are more demands to improve techniques for information security. One of the solutions is steganography, hiding sensitive information within innocentlooking cover media. In this paper, we ...
  • Aye, Tin Nilar; Khine, May Aye (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The process of detecting and removing database defects and duplicates is referred to as data cleaning. The fundamental issue of duplicate detection is that inexact duplicates in a database may refer to the same real ...
  • Oo, Mi Khine; Khine, May Aye (International Journal on Natural Language Computing (IJNLC), 2019-12)
    The tremendous increase in the amount of available research documents impels researchers to propose topic models to extract the latent semantic themes of a documents collection. However, how to extract the hidden topics ...
  • Hein, Pyae Sandi; Khine, May Aye (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Clustering (or cluster analysis) is one of the main data analysis techniques and deals with the organization of a set of objects in a multidimensional space into cohesive groups, called clusters. Each cluster contains ...

Search Repository



Browse

My Account