Mandalay, Myanmar

Mandalay University

www.mu.edu.mm
Mandalay, Myanmar

Mandalay University is a public liberal arts university located in Mandalay, Myanmar. Formerly an affiliate of Rangoon University, Mandalay University is the second oldest university in the country, and the largest university in Upper Myanmar. The university offers bachelor's and master's degree programs in common liberal arts, science and law disciplines. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

Aung N.Z.,Mandalay University | Li S.,Harbin Institute of Technology
Energy Conversion and Management | Year: 2013

In this work, the effect of riser diameter and its inclination angle on system parameters in a two-phase closed loop thermosyphon solar water heater has been numerically investigated. Here, receivable heat flux by the collector, circulating mass flow rate, driving pressure, total pressure drop, heat transfer coefficient in risers and collector efficiency are defined as system parameters. For this aim, a model of two-phase thermosyphon solar water heater that is acceptable for various inclinations is presented and variations of riser diameter and inclination are considered. The riser tube size is varied from 1.25 cm to 2.5 cm with inclination range 2-75. The system absolute pressure is set as 3567 Pa and water is chosen as working fluid. The results show that higher inclination angle is required for higher latitude location to obtain maximum solar heat flux. At local solar noon of 21.996 north latitude, the optimum inclination angle increases in the range of 24-44 with increasing of riser diameter giving maximum circulating mass flow rate from 0.02288 kg/s to 0.03876 kg/s. The longer two-phase heat transfer characteristics can be obtained at smaller inclination angles and mass flow rate for all riser tube sizes. Therefore, it is observed that the optimum inclination angles and diameters for solar heat flux, circulating mass flow rate and heat transfer coefficient in two-phase thermosyphon systemdo not coincide. From this work, better understanding and useful information are provided for constructing two-phase thermosyphon solar heaters. © 2013 Elsevier Ltd. All rights reserved.


Aye T.T.,Mandalay University
ICCRD2011 - 2011 3rd International Conference on Computer Research and Development | Year: 2011

Web usage mining (WUM) is a type of web mining, which exploits data mining techniques to extract valuable information from navigation behavior of World Wide Web users. The data should be preprocessed to improve the efficiency and ease of the mining process. So it is important to define before applying data mining techniques to discover user access patterns from web log. The main task of data preprocessing is to prune noisy and irrelevant data, and to reduce data volume for the pattern discovery phase. This paper mainly focus on data preprocessing stage of the first phase of web usage mining with activities like field extraction and data cleaning algorithms. Field extraction algorithm performs the process of separating fields from the single line of the log file. Data cleaning algorithm eliminates inconsistent or unnecessary items in the analyzed data. © 2011 IEEE.


Nyein S.S.,Mandalay University
ICCRD2011 - 2011 3rd International Conference on Computer Research and Development | Year: 2011

Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g.; banner ads, navigation bars, copy right and privacy notices, advertisements which are not related to the main content (relevant information). In this paper, an algorithm is proposed that extract the main content from the web documents. The algorithm based on Content Structure Tree (CST). Firstly, the proposed system use HTML Parser to construct DOM (Document Object Model) tree from which construct Content Structure Tree (CST) which can easily separate the main content blocks from the other blocks. The proposed system then introduce cosine similarity measure to evaluate which parts of the CST tree represent the less important and which parts represent the more important of the page. The proposed system can define the ranking of the documents using similarity values and also extracts the top ranked documents as more relevant to the query. © 2011 IEEE.


Nhway O.,Mandalay University
International Conference on Advanced Communication Technology, ICACT | Year: 2011

Today, communications technology is one of the most essential roles for our life. People had used many ways of transmissions such as internet, mobile phone and so on. Moreover, VoIP (Voice over Internet Protocol) is also a communications technology. In this paper, we focus on VoIP which transmits voice over packet switched networks such as LANs (Local Area Networks) or WANs (Wide Area Networks). Adding security to a VoIP system, the quality of service and performance of the system are at risk. The contribution of this system has two main parts. Firstly, it illustrates a key from Diffie-Hellman Key Exchange Algorithm. This key is used by AES Algorithm for encryption/decryption process to secure the signaling and voice traffic within a VoIP system. Secondly, it evaluates the performance of a VoIP system to develop speech recognition at receiver. In this system, Mfccs (Mel-Frequency Cepstral Coefficients) is utilized for feature extracting from the incoming voice at receiver. Moreover, Gaussian algorithm is also used for vector quantization in feature matching MFCC features to represent raw speech signal into compact but effective representation that is more stable and discriminative than the original signal. And then the breakdown of call setup is applied by Counting Process in Stochastic Processes. So, this system had captured and analyzed registration, calls setup, voice transmission packets and finally recognized voice or speech by using Mfccs in DSP(Digital Signal Processing) technique. © 2011 Global IT Research Inst.


Aung W.W.,Mandalay University
Advances in Intelligent Systems and Computing | Year: 2016

Overclocking is not a new method for most PC users with the most cost effective perspective for all processors. Two main overclocking methods: Front-Size Bus (FSB) and multiplier changing are used as the popular trends. When the processor need to increase the performance improvement for heavy workloads, overclocking method increases the clock speed cycles by changing multiplier values. In fact, overclocking is the best method to implement with trial and error process which is not warranted by the manufacturers but it is capable. The detail description of types of intensive workloads and multiplier changing overclocking results are shown. The testbed of the paper is based on the specification of Intel Core i7 3770 CPU@3.40 GHz with the core speed 1596.19 MHz as well as bus speed 99.76. The most commonly tools such as CPU-Z, RealTemp, CoreTemp, FFT-z, OCCT tool and Benchmark programs testings are used to validate the system evaluation. © Springer International Publishing Switzerland 2016.


Khaing H.W.,Mandalay University
ICCRD2011 - 2011 3rd International Conference on Computer Research and Development | Year: 2011

Data mining concerns theories, methodologies, and in particular, computer systems for knowledge extraction or mining from large amounts of data. Association rule mining is a general purpose rule discovery scheme. It has been widely used for discovering rules in medical applications. The diagnosis of diseases is a significant and tedious task in medicine. The detection of heart disease from various factors or symptoms is an issue which is not free from false presumptions often accompanied by unpredictable effects. Thus the effort to utilize knowledge and experience of numerous specialists and clinical screening data of patients collected in databases to facilitate the diagnosis process is considered a valuable option. In this paper, we presented an efficient approach for the prediction of heart attack risk levels from the heart disease database. Firstly, the heart disease database is clustered using the K-means clustering algorithm, which will extract the data relevant to heart attack from the database. This approach allows mastering the number of fragments through its k parameter. Subsequently the frequent patterns are mined from the extracted data, relevant to heart disease, using the MAFIA (Maximal Frequent Itemset Algorithm) algorithm. The machine learning algorithm is trained with the selected significant patterns for the effective prediction of heart attack. We have employed the ID3 algorithm as the training algorithm to show level of heart attack with the decision tree. The results showed that the designed prediction system is capable of predicting the heart attack effectively. © 2011 IEEE.


Nhway O.,Mandalay University
Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011 | Year: 2011

As modern society relies on the fault-free operation of complex computing systems, system fault-tolerance has become a matter of course. So, requests on software reliability and availability have progressed greatly due to the current applications. Software applications executing continuously for a long period of time show a degraded performance and/or an increased occurrence rate of hang/crash failure. In this paper, we present and analyze a proactive fault-tolerance using virtualization technology and rejuvenation (preventive maintenance) technique based on stochastic Petri Net Model. This proposed system presents a new model using the virtualized reliability recovery plan to offer high reliability for application servers. Moreover, our results show that the comparison of numerical calculation and SHARPE (Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool simulation. © 2011 AICIT.


Khaing T.A.,Mandalay University
World Academy of Science, Engineering and Technology | Year: 2011

Aloe vera has been used worldwide both for pharmaceutical, food, and cosmetic industries due to the plethora of biological activities of some of its metabolites. The aim of this study was to evaluate the antifungal and antioxidant activities of the leaf extract. The antifungal activity was determined by the agar-well diffusion method against plant and human fungal pathogens. The methanol and ethanol portions of the extracts studied were more bioactive than ethyl acetate portion. It was also observed that the activity was more pronounced on plant pathogen than human pathogen except Candida albicans. This is an indication that the extract has the potential to treat plant fungal infections. The Aloe extract showed the significant antioxidant activity by the DPPH radical scavenging method. Therefore, the Aloe extract provided as natural antioxidant has been used in health foods for medical and preservative purposes.


Thein M.M.,Mandalay University
Proceedings - 2012 International Conference on Information Retrieval and Knowledge Management, CAMP'12 | Year: 2012

Keyword-based search in relational database is an easy and effective way for ordinary users or Web users to access relational databases. Even though relational database management systems (RDBMs) have provided full-text search capabilities, they do not support keyword-based search model. The text databases and relational databases are different that is a challenging task to apply the keyword search techniques in information retrieval (IR) to DB. A common method to performing keyword search in relational database is to generate the minimum connected tuple sets in schema graph transformed from relations. Although existing candidate network (CN) generation methods retrieve a set of joining tuples, they are still problem which is causing large overhead for CNs generation. In this paper, we propose a new candidate network generation algorithm (Heuristic-CNGen) based on the iterative deepening A* (IDA*) algorithm. The proposed algorithm produces a minimum number of CNs according to the maximum number of tuple set. We generate CNs for a given keyword query. And then, we identify the connected tuple tree as a result according to generated CNs. We evaluate the proposed method on DBLP. © 2012 IEEE.


Mon E.E.,Mandalay University
MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services | Year: 2016

The challenges of wireless sensor networks include the unsafe condition of power resources for prolonging network lifetime. Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is a solution for efficient energy consumption in sensor networks, which chooses the cluster head randomly. Therefore, this paper not only tries to improve the cluster head selection process by considering the predefined radius of base station or sink node to choose the gateway nodes as relays, but also considers a sleep/awake cycle for the purpose of reducing the energy consumption. The enhanced protocol, namely E-LEACH is expected to reduce energy consumption and prolong the network lifetime for the sensor networks. © 2016 Copyright held by the owner/author(s).

Loading Mandalay University collaborators
Loading Mandalay University collaborators