Time filter

Source Type

Rangoon, Myanmar

The University of Computer Studies, Yangon , located in the outskirts of Yangon , is the leading IT and computer science university of Myanmar. The university, administered by the Ministry of Science and Technology, offers undergraduate and graduate degree programs in computer science and technology. The language of instruction at UCSY is English. Along with the University of Computer Studies, Mandalay, UCSY is one of two senior universities specialized in computer studies, and also one of the most selective universities in the country.Most of the country's middle and upper level personnel in government and private computer fields are graduates ofUCSY. Wikipedia.

Han E.E.,University of Computer Studies, Yangon
Advances in Intelligent Systems and Computing | Year: 2016

Web application attack detection is one of the popular research areas during these years. Security for web application is necessary and it will be effective to study and analyze how malicious patterns occur in web server log. This system analyzes web server log file, which includes normal and malicious users’ access patterns with their relevant links. This uses web server log file dataset for the detection of web application attacks. This system intends to analyze normal and attack behaviors from web server log and then classify attack types which are included in the dataset. In this system, three types of attacks are detected namely, SQL injection, XSS and directory traversal attacks. Attack analysis stage is done by request length module and regular expressions for various attack patterns. © Springer International Publishing Switzerland 2016. Source

Nanig T.T.,University of Computer Studies, Yangon
Advances in Intelligent Systems and Computing | Year: 2016

This paper focuses on the design consideration for private cloud deployment model in academic environment for authors’ institution. Conceptual benefits of deploying private cloud system is to provide virtualized computing resources to users rather than accessing physical computing resources. The users of the academic cloud will consist of faculties and students in the institution and they would access computing resource as they need to utilize elastically and flexibly on demand. For deployment model for academic cloud environment, we choose an open source software platform “CloudStack” that pools computing resources to build private cloud as well as to manage the network, storage, and compute nodes for cloud Infrastructure. This system is expected to increase the efficient usage of computing resources, utilization of servers and decreasing the power consumption for physical machines by accessing virtual machines from cloud servers. Another goal is to minimize the operation and maintenance cost for computing resources. © Springer International Publishing Switzerland 2016. Source

Thaw M.M.,University of Computer Studies, Yangon
2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010 | Year: 2010

MANET is an autonomous system of mobile wireless nodes connected dynamically without any preexisting infrastructure. Since the nodes are mobile, the network topology changes rapidly and unpredictably over time. The QoS routing has challenging problems due to the network's dynamic topology and limited resources. If only one single constraint condition is considered when making routing decision, QoS can't be guaranteed because the constraint conditions may change and other factors can also affect network performance. In this paper, hop-count, bandwidth, and mobile speed are considered for routing decision. Accounting for the uncertainty of route information in ad-hoc networks, fuzzy logic system is adopted. The simulation is based upon Ad-hoc on demand Distance Vector and considers that data are always transmitted through the route with the lowest delay for real time traffic. The performance of proposed scheme will be evaluated with NS-2 simulator in terms of packet delivery ratio and end-to-end delay. ©2010 IEEE. Source

Su E.T.,University of Computer Studies, Yangon
Communications in Computer and Information Science | Year: 2011

The rapid growth of the information technology, data hiding in audio is an important role of digital media protection and secret communication. Thus, a technique of robust data embedding in the modified discrete cosine transform domain (MDCT) of cover speech signal is presented to solve the issues of digital audio steganography application. The major contribution of the proposed scheme is introduced Probabilistic Global Search Lausanne Algorithm (PGSL) as the optimization-based problem transformation method, to search the best positions in the first selected frames of MDCT Domain on cover speech samples. The covert data are embedded into the positions of lowest bit error rate value to guarantee perfect inaudibility and enhance imperceptible as well as robustness between cover and stego audio. Speech signals from TIMIT Dataset of 452 Male and Female speakers were served to the host cover audio data. The distortion between cover and stego audio is evaluated with Informal Listening Test and Spectrogram. Results of data hiding using TIMIT clean utterance showed that the distortions in the stego audio is inaudible and imperceptible from the original cover speech even with high payload in the Spectrogram and Informal Listening Test. The proposed system defined to apply the signal manipulation attacks as resampling and noise addition to increase in the robustness of data embedding scheme. Objective measurement of stego audio quality degradation by data embedding was performed by PSNR value. © 2011 Springer-Verlag. Source

Thein M.C.M.,University of Computer Studies, Yangon | Thein T.,University of Computer Studies, Yangon
ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation | Year: 2010

Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Clustering is a key routing technique used to reduce energy consumption. Clustering sensors into groups, so that sensors communicate information only to clusterheads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolonging network lifetime. In this paper, we propose an energy efficient cluster-head selection algorithm for adapting clusters and rotating cluster head positions to evenly distribute the energy load among all the nodes. Our proposed model is extended to the LEACH's stochastic cluster-head selection algorithm by modifying the probability of each node to become cluster-head based on remaining energy level of sensor nodes for transmission. Simulation results show that our proposed model could better implement load balance and prolong the lifetime of the network. © 2010 IEEE. Source

Discover hidden collaborations