UCSY's Research Repository

Browsing Faculty of Computer Systems and Technologies Collection by Title

Browsing Faculty of Computer Systems and Technologies Collection by Title

Sort by: Order: Results:

  • Khine, Myat Thiri; Sein, Myint Myint; Aung, Su Nandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Geographic query is composed of query keywords and a location. Spatial keyword queries which are queries on spatial objects associated with textual attributes have received significant attention in geographic ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Naing, Htet Htet; Aye, Zin May (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using ...
  • Oo, Hlaing Thida; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Internet of Things (IoT) is being used the physical sensors into smart sensors housing interfaces and data processing. The proposed system utilizes multi sensors in order to control and also provides user the ability ...
  • Oo, Hlaing Thida; Mya, Khin Than (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Internet of Things (IoT) is monitoring of the surrounding parameters and other several tiny devices connected together to the use of sensors that acquaint for wireless sensing of real time data and transfer them into the ...
  • Hlaing, Wai Mar; Sein, Myint Myint (2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), 2018-12-13)
    This paper aims to support the most suitable route for passengers of the taxi system using the proposed heuristic search method. Furthermore, k-Means Nearest Point Search (kMNPS) algorithm is proposed to produce the ...
  • Kyi, Linn Htaik; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In the rapid improvement of communication environment, it is desirable to improve the security measure on the use of between the sender and receiver. Cryptography is an important aspect of communications security and ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • Hlaing, Wai Mar; Sein, Myint Myint (The 12th International Conference on Future Computer and Communication (ICFCC 2020), 2020-02-26)
    Neighbor Search with Hash Map Indexing Technique is used to get the high performance when the optimal path is searched in the complex networks. This system can also give advice the public bus passengers about the travel ...
  • Hlaing, Wai Mar; Liu, Shi-Jian; Pan, Jeng-Shyang (Journal of Internet Technology(JIT), 2019-11)
    A Novel graph approach named Combined Forward and Backward Heuristic Search (CFBHS) is proposed in this paper, which can be used to solve optimization problems in areas such as transportation and network routing. There ...
  • Phyo, K-zin; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Urban fire is one of the most ordinary problems in all nations. Fire can cause serious damages to people and properties. When the fire event occurred, it is extremely important to reach the fire vehicles to incident ...
  • Chaw, Hnin Thiri; Thuzar, Myat; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In recent year, the transportation networks are becoming more and more complex and navigation services are increasingly necessary for the people living in the modern society. One of the requirements in the cities of ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    For the contradictory issues of the transmission rate and flexibility in the current temperature system, this paper describes the design of a simple low cost microcontroller based real time monitoring. It deals with ...
  • Aung, Thida; Sein, Myint Myint; Hama, Hiromitsu (IEEE 7th Global Conference on Consumer Electronics, 2018-10-18)
    The reconstruction of the damaged historical building, pagoda and temple is a critical task in disaster recovering process. In Myanmar, many pagodas are destroyed due to the earthquake. In this research, 3D reconstruction ...
  • Hlaing, Wai Mar; Sein, Myint Myint (The Seventh International Conference on Science and Engineering 2016, (ICSE 2016), 2016-12-10)
    Nowadays, people widespread use of smartphones and ubiquitous devices for map based services. As the transport network is complicated and massive, people may be confused to reach the desired location after finding ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...

Search Repository



Browse

My Account