UCSY's Research Repository

Browsing Faculty of Computer Systems and Technologies Collection by Author "Mya, Khin Than"

Browsing Faculty of Computer Systems and Technologies Collection by Author "Mya, Khin Than"

Sort by: Order: Results:

  • Zaw, Hnin Thiri; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the rapid advancement of network technology, the security of secret data is threatened because anyone may tend to intrude the system or eavesdrop via the communication channel. Most secret sharing schemes are based ...
  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Oo, Hlaing Thida; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Internet of Things (IoT) is being used the physical sensors into smart sensors housing interfaces and data processing. The proposed system utilizes multi sensors in order to control and also provides user the ability ...
  • Oo, Hlaing Thida; Mya, Khin Than (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Internet of Things (IoT) is monitoring of the surrounding parameters and other several tiny devices connected together to the use of sensors that acquaint for wireless sensing of real time data and transfer them into the ...
  • Kyi, Linn Htaik; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In the rapid improvement of communication environment, it is desirable to improve the security measure on the use of between the sender and receiver. Cryptography is an important aspect of communications security and ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    For the contradictory issues of the transmission rate and flexibility in the current temperature system, this paper describes the design of a simple low cost microcontroller based real time monitoring. It deals with ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...
  • Aung, Cho Cho; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Thet, Khaing Zin; Mya, Khin Than (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Information technology plays a vital role for the development of smart cards. Smart cardscan change the form of the delivery of services and goods, through the automatedidentification and verification of customers, ...

Search Repository



Browse

My Account