University of Computer Studies, Yangon
Rangoon, Myanmar

The University of Computer Studies, Yangon , located in the outskirts of Yangon , is the leading IT and computer science university of Myanmar. The university, administered by the Ministry of Science and Technology, offers undergraduate and graduate degree programs in computer science and technology. The language of instruction at UCSY is English. Along with the University of Computer Studies, Mandalay, UCSY is one of two senior universities specialized in computer studies, and also one of the most selective universities in the country.Most of the country's middle and upper level personnel in government and private computer fields are graduates ofUCSY. Wikipedia.

Time filter
Source Type

Agency: European Commission | Branch: FP7 | Program: CSA | Phase: ICT-2009.9.1 | Award Amount: 954.50K | Year: 2010

The SEALING project, targeting the objective 9.1a of the FP7 ICT work programme, aims at supporting the development of Information Society policy dialogues and the strengthening of cooperation on ICT research with the ASEAN region in general (a region of strategic importance for the EU), and with Singapore in particular (a country with which a MoU on ICT has been signed).\n\nIt builds on the results achieved and the experience gained through the FP7 SEACOOP project, which has already supported, over the period 2007-2009, the development of S&T cooperation in ICT between the two regions.\n\nOn the Southeast Asian side, the SEALING partnership includes the organisation managing ICT research in each of the ten ASEAN countries and is formally supported by the ASEAN Secretariat.\n\nOn the European side, the project involves, through a Project Advisory Committee, over 20 leading companies, research institutes and academia. The project is also supported by the main European Technology Platforms and Joint Technology Initiatives in the ICT area, and by key European initiatives in Southeast Asia, namely the EU-SEA-NET INCO-Net project and the TEIN3 initiative.\n\nThe SEALING project will develop its activities over a 2-year period:\n Organization of at least 6 cooperation events in Europe and in Southeast Asia to be synchronised with policy dialogue meetings,\n Identification and analysis of ICT policy and research priorities, at bilateral and regional levels, and provision of recommendations for future cooperation initiatives,\n Development of synergies with dialogues and activities launched under EU-funded programmes (EU-SEA-NET, TEIN3, Marie Curie, etc.), at the initiative of EU Member States and Associated States, and at the ASEAN level (SCMIT),\n Development of promotion, dissemination and awareness-raising activities.

Han E.E.,University of Computer Studies, Yangon
Advances in Intelligent Systems and Computing | Year: 2016

Web application attack detection is one of the popular research areas during these years. Security for web application is necessary and it will be effective to study and analyze how malicious patterns occur in web server log. This system analyzes web server log file, which includes normal and malicious users’ access patterns with their relevant links. This uses web server log file dataset for the detection of web application attacks. This system intends to analyze normal and attack behaviors from web server log and then classify attack types which are included in the dataset. In this system, three types of attacks are detected namely, SQL injection, XSS and directory traversal attacks. Attack analysis stage is done by request length module and regular expressions for various attack patterns. © Springer International Publishing Switzerland 2016.

Nanig T.T.,University of Computer Studies, Yangon
Advances in Intelligent Systems and Computing | Year: 2016

This paper focuses on the design consideration for private cloud deployment model in academic environment for authors’ institution. Conceptual benefits of deploying private cloud system is to provide virtualized computing resources to users rather than accessing physical computing resources. The users of the academic cloud will consist of faculties and students in the institution and they would access computing resource as they need to utilize elastically and flexibly on demand. For deployment model for academic cloud environment, we choose an open source software platform “CloudStack” that pools computing resources to build private cloud as well as to manage the network, storage, and compute nodes for cloud Infrastructure. This system is expected to increase the efficient usage of computing resources, utilization of servers and decreasing the power consumption for physical machines by accessing virtual machines from cloud servers. Another goal is to minimize the operation and maintenance cost for computing resources. © Springer International Publishing Switzerland 2016.

Myint J.,University of Computer Studies, Yangon | Naing T.T.,University of Computer Studies, Yangon
Proceedings - 2011 International Conference on Cloud and Service Computing, CSC 2011 | Year: 2011

The need and use of scalable storage on cloud has rapidly increased in last few years. Organizations need large amount of storage for their operational data and backups. To address this need, high performance storage servers for cloud computing are the ultimate solution, but they are very expensive. Therefore we propose efficient cloud storage system by using inexpensive and commodity computer nodes. These computer nodes are organized into PC cluster as datacenter. Data objects are distributed and replicated in a cluster of commodity nodes located in the cloud. In the proposed cloud storage system, a data placement algorithm which provides a highly available and reliable storage is proposed. The proposed algorithm applies binary tree to search storage nodes. It supports the weighted allocation of data objects, balancing load on PC cluster with minimum cost. The proposed system is implemented with HDFS and experimental results prove that the proposed algorithm can balance storage load depending on the disk space, expected availability and failure probability of each node in PC cluster. © 2011 IEEE.

Thein M.C.M.,University of Computer Studies, Yangon | Thein T.,University of Computer Studies, Yangon
ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation | Year: 2010

Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Clustering is a key routing technique used to reduce energy consumption. Clustering sensors into groups, so that sensors communicate information only to clusterheads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolonging network lifetime. In this paper, we propose an energy efficient cluster-head selection algorithm for adapting clusters and rotating cluster head positions to evenly distribute the energy load among all the nodes. Our proposed model is extended to the LEACH's stochastic cluster-head selection algorithm by modifying the probability of each node to become cluster-head based on remaining energy level of sensor nodes for transmission. Simulation results show that our proposed model could better implement load balance and prolong the lifetime of the network. © 2010 IEEE.

Mon E.E.,University of Computer Studies, Yangon | Naing T.T.,University of Computer Studies, Yangon
Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011 | Year: 2011

Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. The cloud allows users to avoid upfront hardware and software investments, gain flexibility, collaborate with others, and take advantage of the sophisticated services. However, security is a huge issue for cloud users especially access control, user profile management and accessing services offered by the private cloud environment. A privacy enhancement system on Academic-based private cloud system using Eucalyptus open source cloud infrastructure has been proposed in this paper. This system provides the cloud users to improve the privacy and security of the private personal data. Two approaches (Role-based Access Control and Attribute-based Access Control model) are combined as a new approach (ARBAC). This means that they are applied to improve the privacy which supports both mandatory and discretionary access control needs on the target private cloud system. © 2011 IEEE.

Swe T.M.M.,University of Computer Studies, Yangon | Kham N.S.M.,University of Computer Studies, Yangon
2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010 | Year: 2010

Domain knowledge may be used in medical applications to avoid wrong decisions and also to be able to make a correct decision for strong working diagnosis and partly for therapeutic purpose. In this paper, Case Based Reasoning (CBR) methodology has been applied by combining with ontology for implementing case-based medical diagnostic knowledge structure. The development of knowledge repository for disease-specific treatment has proposed in order to support diagnosis process, provide and share the knowledge of medical experts for diagnostic process and treatment of specific disease. It has also been described that medical Knowledge Base (KB) systems are either highly specialize, lack accuracy or are just too simple. To overcome this problem of scope, this paper describes a methodology for proliferating the scope and precision of the diagnostic ontology-based knowledge base. It also aims to understand and solve new similar problems and support similar decision making as well as share medical knowledge and treatment experiences among the medical practitioners. The application area is concerning a common and often deadly infectious disease, tuberculosis (TB) especially the pulmonary TB. ©2010 IEEE.

Thaw M.M.,University of Computer Studies, Yangon
2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010 | Year: 2010

MANET is an autonomous system of mobile wireless nodes connected dynamically without any preexisting infrastructure. Since the nodes are mobile, the network topology changes rapidly and unpredictably over time. The QoS routing has challenging problems due to the network's dynamic topology and limited resources. If only one single constraint condition is considered when making routing decision, QoS can't be guaranteed because the constraint conditions may change and other factors can also affect network performance. In this paper, hop-count, bandwidth, and mobile speed are considered for routing decision. Accounting for the uncertainty of route information in ad-hoc networks, fuzzy logic system is adopted. The simulation is based upon Ad-hoc on demand Distance Vector and considers that data are always transmitted through the route with the lowest delay for real time traffic. The performance of proposed scheme will be evaluated with NS-2 simulator in terms of packet delivery ratio and end-to-end delay. ©2010 IEEE.

Su E.T.,University of Computer Studies, Yangon
Communications in Computer and Information Science | Year: 2011

The rapid growth of the information technology, data hiding in audio is an important role of digital media protection and secret communication. Thus, a technique of robust data embedding in the modified discrete cosine transform domain (MDCT) of cover speech signal is presented to solve the issues of digital audio steganography application. The major contribution of the proposed scheme is introduced Probabilistic Global Search Lausanne Algorithm (PGSL) as the optimization-based problem transformation method, to search the best positions in the first selected frames of MDCT Domain on cover speech samples. The covert data are embedded into the positions of lowest bit error rate value to guarantee perfect inaudibility and enhance imperceptible as well as robustness between cover and stego audio. Speech signals from TIMIT Dataset of 452 Male and Female speakers were served to the host cover audio data. The distortion between cover and stego audio is evaluated with Informal Listening Test and Spectrogram. Results of data hiding using TIMIT clean utterance showed that the distortions in the stego audio is inaudible and imperceptible from the original cover speech even with high payload in the Spectrogram and Informal Listening Test. The proposed system defined to apply the signal manipulation attacks as resampling and noise addition to increase in the robustness of data embedding scheme. Objective measurement of stego audio quality degradation by data embedding was performed by PSNR value. © 2011 Springer-Verlag.

Win Z.M.,University of Computer Studies, Yangon | Sein M.M.,University of Computer Studies, Yangon
Proceedings of the SICE Annual Conference | Year: 2011

Fingerprints are widely used in biometric techniques for automatic personal identification. In this paper, a fingerprint recognition system is developed to identify a person according to fingerprint image on Myanmar National Registration Cards (NRCs). It can be acquired only the low quality fingerprint image from NRC card. Generally, fingerprint identification approaches are minutiae-based and correlation-based. Although the minutiae-based method is popular and extensively used method for fingerprint identification, it shows poor performance for low quality images. In proposed system, the correlation-based approach for fingerprint recognition is developed by calculating the mean value of correlation factors. The mean value of correlation factors of input image and template image are computed and compared. If it is over a certain threshold the result of the matching process is positive otherwise negative. Before calculating correlation factor, fingerprint enhancement algorithm using gabor filters are applied for good ridge line feature extraction. Therefore, the proposed system can identify not only on the good quality fingerprint but also on the bad or poor quality fingerprint. The effectiveness of the proposed system can be confirmed through the experimental results. © 2011 SICE.

Loading University of Computer Studies, Yangon collaborators
Loading University of Computer Studies, Yangon collaborators