Paper/ Journal Title | Authors | Publication Type | Name of Conference/ Journal | Published Year | Published Month & Day | Field of Research | Name of Department | Keywords | Abstract | department_hfilter | publication_type_hfilter | publisher_hfilter | published_year_hfilter | field_of_research_hfilter | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Web page Category Classification Using Decision Tree Classifier and Recommendation of Related Links | Phyu Phyu Thant, Amy Aung | conference paper | 2022 | Data Mining | FIS | Web Page Classification, TF-IDF, C4.5, Web Content Mining | Download | Abstract: Today, there has been an exponential growth in the number of electronic documents and pages in the web that is needed accurate automated classifiers of machine learning method. The purpose of the web data mining is to find the useful knowledge or information from web contents, web usages and hyperlinks. In this paper, the web page category classification system is proposed. The background theory of this system is web data mining. This system is tested a collection of hyperlinks in the computer science domain and ten categories of class. In this paper, it is seen web preprocessing for extracting contents. For classification, the system uses TF-IDF features extraction and decision tree classifier. The result shows that the proposed system produces the category of classified page according to predefined class category and related links of its. | fis | conference-paper | data-mining | |||||
Myanmar Word Sense Disambiguation based on HMM | Htwe Htwe Lin, Kyi Kyi Lwin | Journal | 2020 | WSD, text corpus, HMM | Natural Language Processing | FIS | WSD, text corpus, HMM | Download |
| fis | journal | 2020 | natural-language-processing | |||
An effictive approach of semantic analysis to Natural Language Translation System (English-Myanmar Language) | Tin Htar Nwe, Phyo Phyo Wai | Journal | 2019 | 14 th March" | Natural Language Processing | FIS | WSD | Download |
| fis | journal | 2019 | natural-language-processing | |||
"Image Segmentation by using global and local and local threaholding alogrithm" | "Hla Hla Myint, Phyo Phyo Wai, Moe Moe Zaw" | Journal | 2019 | July | Image Processing | FIS | Image segmentation, Thresholding | Download |
| fis | journal | 2019 | image-processing | |||
Supervised Word Sense Disambiguation for Myanmar using Joint Entropy | Phyo Phyo Wai, Tin Htar Nwe | conference paper | 2013 | - | Natural Language Processing | FIS | WSD, text corpus | Download |
| fis | conference-paper | 2013 | natural-language-processing | |||
"Evaluating The Verb Sense Disambiguation Using Naïve Bayesian Classifiers in Machine Translation" | Phyo Phyo Wai | conference paper | 2010 | - | Natural Language Processing | FIS | Word Sense Disambiguation (WSD), and Naïve Bayesian Classifier | Download |
| fis | conference-paper | 2010 | natural-language-processing | |||
Choosing the Proper Target Word by using Statistical Method | Phyo Phyo Wai | conference paper | 2011 | - | Natural Language Processing | FIS | Decision Tree, Word Sense Disambiguation(WSD) | Download |
| fis | conference-paper | 2011 | natural-language-processing | |||
Proposed Myanmar Word Tokenizer based on LIPIDIPIKAR Treatise | "Thein Than Thwin, Phyo Phyo Wai" | conference paper | 2010 | April(16-18) | Natural Language Processing | FIS | token, Unicode, NLP, Condensed form, Elaborated form | Download |
| fis | conference-paper | 2010 | natural-language-processing | |||
Myanmar Word Sense Disambiguation using Mutual Information | Phyo Phyo Wai, Tin Htar Nwe | conference paper | 2012 | - | Natural Language Processing | FIS | Word Sense Disambiguation (WSD), NLP and Mutual Information | Download |
| fis | conference-paper | 2012 | natural-language-processing | |||
"Word Sense Disambiguation for Myanmar to English Translation" | Phyo Phyo Wai, Khin Thidar Linn | conference paper | 2011 | - | Natural Language Processing | FIS | Decision Tree, Word Sense Disambiguation(WSD) | Download |
| fis | conference-paper | 2011 | natural-language-processing | |||
Myanmar to English Verb Translation Disambiguation approach based on Naïve Bayesian Classifier | Phyo Phyo Wai, Khin Thandar Linn | conference paper | 2011 | March(11-13) | Natural Language Processing | FIS | Word Sense Disambiguation (WSD), NLP and Naïve Bayesian Classifier | Download |
| fis | conference-paper | 2011 | natural-language-processing | |||
APPLICATION OF LINEAR PROGRAMMING FOR PROFIT MAXIMIZATION OF REGIONAL PLANNING | Zin Mar Oo, Hla Hla Myint | Book, National paper | 2020 | June | Computing | ITSM | linear programming model, Profit optimization, simplex method, Graphical method, | Download | This paper is prepared to determine the optimal solution using linear programming model, and it analysed for profit optimization of a farm located at Yinmarbin Township in Sagaing Division during raining paddy. Linear programming is a method to achieve the best outcome in a mathematical model whose requirements are represented by linear relationships. The profits varied considerably depending on subjective. In linear programming model, a theoretical perspective undertaking for the present study is review of various different applications. Collected data is analysed to determine the decision making and to solve the problem is defined. By using decision variables of production, sales and profit over a period, objective function is can constructed. So, a linear programming model is developed for profit optimization of company. But production cost is considered for minimum. In this paper, we calculated the profit optimal solution by using graphical method and simplex method. | itsm | book national-paper | 2020 | computing | |||
Brain Tumor Segmentation on Multi-Modal MR image using Active Contour Method | Hla Hla Myint, Soe Lin Aung | Book, National paper | 2020 | November | Image Processing | ITSM | active contour, HGG, LGG, Dice index, Jaccard index | Download | Brain tumor segmentation is one of the most important in medical image processing, and it separates the different tumor tissues such as active cells, necrotic core, and edema from normal brain tissues. Normal brain tissues are White Matter (WM), Gray Matter (GM), and Cerebrospinal Fluid (CSF). In medical image processing, segmentation of the internal structure of brain is the fundamental task. The precise segmentation of brain tumor has great impact on diagnosis, monitoring, treatment planning for patients. Various segmentation techniques are widely used for brain Magnetic Resonance Imaging (MRI). In this paper, we propose an efficient method on active contour for 3 D volumetric MRI brain tumor segmentation, in which preprocessing use the image resize and then accurately segment the magnetic resonance images (MRI). Active contour model, also called snakes, are widely used in many applications. Three D volumetric MR images consist of T1, T1ce, T2 and Fluid Attenuated Inversion Recovery (FLAIR). | itsm | book national-paper | 2020 | image-processing | |||
An Efficient Tumor Segmentation of MRI Brain Image using Thresholding and Morphology Operation | Hla Hla Myin, Dr. Soe Lin Aung | Internaional conference paper | 2020 | February | Image Processing | ITSM | Image segmentation, Thresholding, Morphology operation, Preprocessing | Download | In medical image processing, segmentation of the internal structure of brain is the fundamental task. The precise segmentation of brain tumor has great impact on diagnosis, monitoring, treatment planning for patients. Various segmentation techniques are widely used for brain Magnetic Resonance Imaging (MRI). The aim of this paper presents an efficient method of brain tumor segmentation. Morphological operation, pixel extraction threshold based segmentation and Gaussian high pass filter techniques are used in this paper. Thresholding is the simplest approach to separate object from the background, and it is an efficient technique in medical image segmentation. Morphology operation can be used to extract region of brain tumor. This system converts the RGB image to gray scale image and removes the noise by using Gaussian high pass filter. Gaussian high pass filter produced sharpen image and that improves the contrast between bright and dark pixels. This method will help physicians to identify the brain tumor before performing the surgery. | itsm | internaional-conference-paper | 2020 | image-processing | |||
Comparision of Thresholding Method in Image Segmentation | Zin Mar Oo, Hla Hla Myint | Internaional conference paper | 2019 | - | Image Processing | ITSM | image segmentation, Thresholding | Download | Image segmentation is the most challenging tasks of image processing. Many algorithms and techniques have been advanced in medical application. Several segmentation techniques involved detection, recognition and measurement of features which can be classified as either contextual or non-contextual. Among all the segmentation methods, the fundamental approach to segment an image is based on the intensity levels and is called as threshold based. For image processing and pattern recognition, thresholding is an essential method. Image thresholding technique needs determining a threshold value T and the method converts a gray scale image into a binary image. Thresholding is the simplest approach to separate object from the background, and efficient technique in medical image segmentation. In this paper, five different thresholding methods are analyzed and compared their segmentation images. The different method for image segmentation has been simulated using MATLAB. The analysis and comparison of that five thresholding algorithms are Sauvola, Niblack, Otsu’s, iterative and histogram thresholding. | itsm | internaional-conference-paper | 2019 | image-processing | |||
Image segmentation by using global and local thresholding algorithm | Hla Hla Myint, Phyo Phyo Wai, Dr. Moe Moe Zaw. | Online Journal | 2019 | July | Image Processing | ITSM | Image segmentation, Thresholding | Download |
| itsm | online-journal | 2019 | image-processing | |||
Effective performance of hidden markov model for epidemilogic survelliance | Hla Hla Myint | Online Journal | 2019 | March | Image Processing | ITSM | Hidden Markov model, Influenza, Epidemics | Download | The public health surveillance system is one of the most important for the detection of the seasonal influenza epidemic. We introduced different kinds of surveillance data for early detection of a disease outbreak. Hidden Markov model has been recognized as an appropriate method to model disease surveillance data. In this work, we proposed a hidden Markov model (HMM) to characterize epidemic and non-epidemic dynamic in a time series of influenza-like illness incidence rates and presents a method of influenza detection in an epidemic. ILI is defined as an illness marked by the presence of a fever (100.5 ℉or greater) and either a cough or sore throat within 72 hours of ILI symptom onset, or physician-diagnosed ILI. ILI incidence rate is based on surveillance data and activity state. HMMs have been used in many areas, including automatic speech recognition, electrocardiographic signal analysis, the modelling of neuron firing and meteorology. A two-state HMM is applied on incidence time series assuming that those observations are generated from a mixture of Gaussian distribution. Bayesian inference method is calculated to obtain the probability of an epidemic state and non-epidemic state every week. The various influenza dataset applied the methodology. | itsm | online-journal | 2019 | image-processing | |||
Making Medical Decision for IFR Rate using Fuzzy Logic | Tin Yadanar Zaw, Hla Hla Myint | Conference | 2012 | February | Artificial Intelligence | ITSM | fuzzy logic,IFR Rate | Download | The paper aims to precise a medical decision making for IFR (Intravenous Fluid Resuscitation) rate at ICU (Intensive Care Unit) using Fuzzy Logic. Intensive care medicine frequently involves making rapid decision. To make medical decisions, physicians often rely on conventional wisdom and personal experiences to arrive subjective assessments and judgments. The methods of Fuzzy Logic are suited to the nonexplicit nature of clinical decision making. So, this system implements fuzzy logic to administer the rate of Intravenous Fluid Resuscitation (IFR).The paper introduces a simple and effective methodology for making a medical decision based on fuzzy logic. Finally the system produces the adjusted IFR rate. | itsm | conference | 2012 | artificial-intelligence | |||
Secure Data Transmission Using Digital Envelope Steganography System | Saw Min Tun | Book | 2015 | December | Cryptography and Steganography | FCST | ptography, RC5 Algorithm, RSA Algorithm, Steganography, LSB | Download | Nowadays, digital communication has become an essential part of infrastructure and a lot of applications areInternet-based. Consequently, the security of information has become a fundamental issue. In this system,steganography and cryptography methods are used to be more secure for the message transmission on thepublic network. The message transmission has two parts: sender site and receiver site. In the sender site, firstlythe massage is encrypted by using RC5 algorithm with RC5 secret key. And then, the RC5 key is encrypted by using RSA algorithm with receiver public key. Finally, the encrypted message and encrypted RC5 secret key is embedded into a cover image by using LSB steganographic algorithm. At the receiver site, firstly extract the encrypted message and encrypted RC5 secret key from the stego image. After that, the RC5 secret key is recovered by using RSA decryption algorithm with receiver private key. Finally the original message is recovered by using RC5 decryption algorithm with RC5 secret key at the receiver site. | fcst | book | 2015 | cryptography-and-steganography | |||
"Microcontroller Based Humidity and Temperature Monitoring System" | "Dr. Thuzar Aung, Nyein Nyein Hlaing, Tint Tint Oo" | Journal | 2019 | - | Micro Electronic and Control System | FCST | Arduino, microcontroller, monitoring, IDE, codes | Download | Arduino is associate open supply hardware and software. Arduino hardware, a motherboard, is employed in order to create interacting objects with appropriate computer programing Integrated Development surroundings (IDF). The aim of the paper is to create Associate in Nursing Arduino-based embedded device for observance environmental variables like wetness and temperature. The performance in numerous temperature and wetness is additionally studied within the paper, the device was engineered by victimisation the Arduino microcontroller board (Uno) and sensors, which may sense the temperature and quantity of wet within and outdoors a building within the implementation, info is showed each on a serial monitor and on a liquid display. | fcst | journal | 2019 | micro-electronic-and-control-system | |||
Implementing Defenense System of DNS Hijacking and Cache Poisoning Attachs in the Domain Name System | "Tint Tint Oo, Dr. Ingyin Oo" | Conference | 2010 | December | Networking and Security | FCST | - | Download | The Domain Name System (DNS) is one of the key components of the Internet and most IP networks for that matter. Despite the Domain Name System being important, not many people have even heard of DNS; few know what it is and how to keep its security. DNS translates the server names which humans are more likely to remember into IP addresses which computers use to navigate through the Internet. In most of DNS transactions, protection of information is needed. Because of its vital role, DNS is involved in manifold Internet attacks both against the system itself and other Internet hosts. DNS and its vulnerabilities, various attacks to DNS system, and preventing methods will be described in this paper. | fcst | conference | 2010 | networking-and-security | |||
"Analysis of Open-Loop Stepper Motor Control System on Matlab and VHDL" | Aye Aye Mon | Journal | 2020 | May | Automatic Control System | NS | Motor drive system, MATLAB, Verilog HDL | Download | n this paper, a stepper motor control system is designed and implemented on MATLAB/ Simulink. First of all, stepper motor is mathematically implemented on MATLAB/ Simulink using its subsystems. Feedback control is also considered in the system. After that, the system is partially optimized and simulated on Modelsim. In comparison with Verilog HDL, using MATLAB/Simulink to construct most of the functions of the motor drive system is more convenient and efficient, and the resulting codes could be optimized directly by the edit of Verilog HDL code. Simulations and experiments are demonstrated to show the performances. | ns | journal | 2020 | automatic-control-system | |||
"Funzzy Logic PID Control of Automatic Volage Regulator System" | Aye Aye Mon | conference paper | 2009 | February | Automatic Control System | NS | Fuzzy logic system, PID Controller, control system, controlled A V R | Download | The application of a simple microcontroller to deal with a three variable input and a single output fuzzy logic controller, with Proportional – Integral – Derivative (PID) response control built-in has been tested for an automatic voltage regulator. The fuzzifiers are based on fixed range of the variables of output voltage. The control output is used to control the wiper motor of the auto transformer to adjust the voltage, using fuzzy logic principles, so that the voltage is stabilized. In this report, the author will demonstrate how fuzzy logic might provide elegant and efficient solutions in the design of multivariable control based on experimental results rather than on mathematical models. Keywords—Fuzzy logic system, PID Controller, control systems, controlled A V | ns | conference-paper | 2009 | automatic-control-system | |||
"Ritz Method and Ɵ- Family Method for Time Dependent Problems" | Myint Theingi | Journal | 2014 | - | D.E | FC | - | Download | In this paper we deal with combination of two methods to determine approximate solution of time dependent problems. In the finite element solution of time dependent problems we assume that the nodal variables are functions of time. In this way, we can solve time dependent problems whose solutions can be represented as a product of a time function and a spatial function. | fc | journal | 2014 | d-e | |||
A Study on Topology | Win win Than, Myint Theingi | Journal | 2012, 2013 | - | Algebra | FC | - | Download | In this research paper, we study continuity, open mapping, closed mapping and homeomorphism on topological spaces. Then we also study that the relation of homeomorphism onto the set of all topological spaces is an equivalence relation | fc | journal | 2012 2013 | algebra | |||
Study On Soil Classification Using Linear Regression Analysis | Chaw Kalyar Than, Yawai Tint | Book | 2019 | December | Applied Mathematic | FCST | Soil Dataset, Soil Classification, SPSS Software, Linear Regression Analysis | Download | Statistical regression analysis is a powerful and reliable method to determine the impact of one or several independent variable(s) on a dependent variable. It is the most widely used of all statistical methods and has broad applicability to numerous practical problems. Classification of soil type is very important for agricultural and engineering field around the world. Soil type is predicted using classification Techniques such as regression analysis, K mean cluster and so on. In this paper, it is tempt to use the predicting equation for soil type by using SPSS software based on linear regression analysis. The data is collected from soil profiles at each site. In this analysis, there are one parameter as an independent variable. This parameters are denoted as PI (Plasticity Index), Fine Content and Liquid Limit. According to the aim, this equation is easy to determine soil type at each layer of soil profile. Moreover, this paper aims to prove the right way in the usage of applied mathematics for predicting the classification of soil type. | fcst | book | 2019 | applied-mathematic | |||
"Image Inpainting System for Cultural Museum Using Fast Marching Method" | Hsint Hsint Htay, Yawai Tint | Book | 2019 | December | Digital Image Processing | FCST | Impainting, Fast Marching Method | Download | Digital image inpainting provides a means for reconstruction of small damaged portions of an image. Inpainting, the technique of modifying an image in an undetectable form, is as ancient as art itself. Image restoration or image reconstruction is a technique to improve the quality of image. Hence, we develop Image Inpainting System using Fast Marching Method (FMM) to edit damage photo like original photo. Fast Marching Method (FMM) is very simple to implement, fast and produce nearly identical results. This system can remove and replace selected objects due to the advantages of FMM. In addition, this system can be used to originate photos for museum restoration artists and to modify the image in retouching that is non-detectable by an observer. | fcst | book | 2019 | digital-image-processing | |||
Study On Mathematical Models With Discharge Flow Rate Based On Rainfall Fluctuation In Kalewa State | Hsu Yi Mon Win, Yawai Tint | Book | 2019 | December | Applied Mathematic | FCST | Rainfall, Discharge Flow, Exponential Regression Equation, SPSS Software | Download | The discharge flow and rainfall fluctuation play very important effects to cause climate conditions all over the world. The climate changes are caused to damage people’s lives and their properties and other infrastructures. Therefore, it is tempting to study the prediction of the discharge flow concerning rainfall data by using the exponential regression analysis in SPSS statistics software. The discharge flow and rainfall data are collected from the Meteorological Department. The dependents variable is defined as the annual mean log discharge flow and the independent variable is referred to as annual mean rainfall in this study. The model obtained from the result is to be beneficial tool for local government authorities to reduce the death toll rate and other sectors. | fcst | book | 2019 | applied-mathematic | |||
Analysis of Traffic Injury Severity by Using Two- Stage Data Mining Algorithms | Yawai Tint, Yoshiki Mikami | Online Journal | 2015 | October | Data Science | FCST | Injury Severity Analysis, Neural Network, Decision Tree | Download | Transportation continues to be an integral part of modern life, and the importance of road traffic safety cannot be overstated. Consequently, most of the existing studies of risk factors; the data are categorized according to the accident severity level. While some of the risk factors, such as drug use and drinking, are widely known to affect severity, an accurate modeling of their influences is still an open research topic. This paper proposes a two- stage mining framework to explore the key risk conditions that may have contributed to powered four-wheelers and two-wheelers in Europe countries. In the first stage, to identify the potential risk conditions that best elucidate for crash severity by using neural network. In the second stage, top ranking risk factors from the neural network are respectively used as feature variables of the decision tree classifier. The analysis shows that the most important factors affecting the traffic injury severity. | fcst | online-journal | 2015 | data-science | |||
Active Steganalysis of Mp3Stego | Yawai Tint, Khin Than Mya | Book | 2014 | February | Digital Signal Processing, Information Security | FCST | Steganalysis, MP3, Principle Component Analysis (PCA), Independent Component Analysis (ICA), Part2_3_length, Global_gain | Download | The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit use of steganography. This paper develops an active steganalysis system for detecting hidden messages, by estimating frames with hidden message and message length in compressed audio files produced by MP3Stego. Principle Component Analysis (PCA) is applied not only to estimate uncorrelated components but also help to detect whether the received MP3 streams are steganography or original. In this steganalysis system, hidden messages can be detected in the PCA (whitening) stage. Independent Component Analysis (ICA) attempts to separate a set of steganographic signals from original signals. By analyzing the nature of MP3 signals (frame header, side information), frame with secret message can be detected. The results of empirical tests reach 97% and conclude that detection accuracy of the proposed steganalysis system is convenient for MP3Stego embedded contents. Experiments shows that the proposed method can be used quite effectively to detect locations of messages embedded using nature of MP3 signal. | fcst | book | 2014 | digital-signal-processing information-security | |||
Breaking the Steganographic Utility Mp3Stego | Yawai Tint, Khin Than Mya | Book | 2013 | February | Digital Signal Processing, Information Security | FCST | MP3Stego, Perceptual Evaluation of Speech Quality (PESQ), Bit Error Rate (BER) | Download | The majority of steganographic utilities for covering of confidential communication suffer from fundamental weaknesses. To more secure steganographic algorithms, the development of attacks is essential to assess security. In this paper, techniques are presented which aim at the breaking of steganography usage in digital audio data. In this propose system, white noise is added to the audio signal and lowest bit of part2_3_length is changed by other bit. The propose scheme analyzes this algorithm by using MP3Stego. | fcst | book | 2013 | digital-signal-processing information-security | |||
Steganalysis for MP3 Stego using Independent component analysis | Yawai Tint, Khin Than Mya | Book | 2013 | December | Digital Signal Processing, Information Security | FCST | steganalysis, MP3, principle component analysis (PCA), independent component analysis (ICA). | Download | Steganalysis means detecting messages hidden by steganography. Steganalysis not only use information security but also can avert the illegal use of steganography. MP3 audio are commonly used in secret message embedding, which causes less doubtful than other audio formats. This system proposes a scheme for detecting secret messages embedded by MP3Stego. Principle component analysis (PCA) and independent component analysis (ICA) are used in this steganalysis system. PCA is used for estimating independent components and detecting whether the input mp3 files are steganography or original. ICA uses to split a set of steganographic signals from original signals. Experimental outcomes validate that the proposed system can detect the MP3Stego effectively. | fcst | book | 2013 | digital-signal-processing information-security | |||
Audio Steganalysis Based on Independent Component Analysis | Yawai Tint, Khin Than Mya | Book | 2012 | February | Digital Signal Processing, Information Security | FCST | MP3Stego, Principle Component Analysis (PCA), Independent Component Analysis (ICA) | Download | Steganalysis is the art and science of detecting messages hidden using steganography. This paper proposes steganalysis of audio signal using Independent Component Analysis. A detection method is used for detecting hidden message in compressed audio files produced by MP3Stego. Steganography can be successfully detected during the Principle Component Analysis (PCA) whitening stage. A nonlinear robust batch ICA algorithm, which is able to efficiently extract various temporally correlated sources from their observed linear mixture are used for blind steganography extraction. | fcst | book | 2012 | digital-signal-processing information-security | |||
Source Separation of Steganography Mixed Audio Signal | Yawai Tint, Khin Than Mya | Book | 2011 | February | Digital Signal Processing, Information Security | FCST | steganography, Independent Component Analysis | Download | The research on blind source separation is focus in the community of signal processing and has been developed in recent years. This paper proposes enhance audio steganalysis technique, which adopts Independent Component Analysis (ICA) for steganography detection and extraction process. Steganography can be successfully detected during the Principle Component Analysis (PCA) whitening stage. A nonlinear ICA algorithm, which is able to efficiently extract various temporally correlated sources from their observed linear mixtures, is used for blind steganography extraction. | fcst | book | 2011 | digital-signal-processing information-security | |||
A Minimum Redundancy Maximum Relevance- based Approach for Multivariate Causality Analysis | Yawai Tint, Yoshiki Mikami | Online Journal | 2017 | October | Data Science | FCST | Causality, Dummy Variable, MRMR, Multivariate Analysis | Download | Causal analysis, a form of root cause analysis, has been applied to explore causes rather than indications so that the methodology is applicable to identify direct influences of variables. This study focuses on observational data-based causal analysis for factors selection in place of a correlation approach that does not imply causation. The study analyzes the causality relationship between a set of categorical response variables (binary and more than two categories) and a set of explanatory dummy variables by using multivariate joint factor analysis. The paper uses the minimum redundancy maximum relevance (MRMR) algorithm to identify the causation utilizing data obtained from the National Automotive Sampling System’s Crashworthiness Data System (NASS-CDS) database. | fcst | online-journal | 2017 | data-science | |||
A Minimum Redundancy Maximum Relevance- based Causal Assessment of Injury Severity | Yawai Tint, Yoshiki Mikami | Online Journal | 2017 | July | Data Science | FCST | Causality, Injury Severity, Multivariate Analysis, NASS-CDS | Download | Minimum Redundancy Maximum Relevance (mRMR) is an algorithm which has applied in various domains for feature selection. This study has adopted mRMR in multivariate causal analysis to explain the factors contributing to injury severity. mRMR uses the mutual information to maximize the joint dependency with injury severity to identify the most relevant and the least redundant set of causal factors. This study examines the relationship between injury severity and 17 causal factors, which represent the integrated aspects of human, vehicle and environment. The data were acquired from the National Automotive Sampling system/Crashworthiness Data System (NASS-CDS), as categorical variables. The results compared the number of factors required to explain injury severity by using mRMR and MI in multivariate causal analysis. Accordingly, mRMR can explain about 80% of the injury severity of male, female and older age groups by using a group of seven factors. Whereas, MI can only explain about 60% of injury severity by a group of seven factors for the same. Hence, mRMR can be recommended as the appropriate multivariate analysis method for complex data which is applicable in the domain of traffic injury prevention. | fcst | online-journal | 2017 | data-science | |||
Audio Steganalysis Using Features Extraction and Classification | Yawai Tint, Khin Than Mya | Book | 2012 | - | Digital Image Processing, Information Security | FCST | steganalysis, steganography, correlation coefficient | Download | Audio steganalysis has attracted more attentions recently. In this article, propose a steganalysis method for detecting the presence of information-hiding behavior in wav audios. We extract mel-frequency ceptral coefficient, zero crossing rate, spectral flux and short time energy features of audio files, and combine these features with the features extracted from the modified version that is generated by randomly modifying the least significant bits. And then correlation coefficient method is utilized in classification. Experimental result show that the propose method performs well in steganalysis of the audio stegograms that are produced by using Hide4PGP, Stegowav and S-tools4. | fcst | book | 2012 | digital-image-processing information-security | |||
Electrocardiogram (ECG) Beat Classification Based on Correlation Coefficient Method | Yawai Tint , Tin Mar Kyi | Book | 2008 | - | Digital Signal Processing | FCST | Correlation Coefficient, ECG, Classification | Download | – | fcst | book | 2008 | digital-signal-processing | |||
Histogram of Accumulated Changing Gradient Orientation (HACGO) for Saliency Navigated Action Recognition | "Hnin Mya Aye Sai Maung Maung Zaw" | conference paper | 2017 | June | Image Processing | FCS | Action Recognition, HACGO, HOF, HOG, SVM | Download |
| fcs | conference-paper | 2017 | image-processing | |||
Salient Object based Action Recognition using Histogram of Changing Edge Orientation (HCEO) | "Hnin Mya Aye Sai Maung Maung Zaw" | conference paper | 2017 | June | Image Processing | FCS | Action Recognition, HCEO, HOF,SVM | Download |
| fcs | conference-paper | 2017 | image-processing | |||
Efficient Action Recognition based on Salient Object Detection | "Hnin Mya Aye Sai Maung Maung Zaw" | conference paper | 2017 | February | Image Processing | FCS | - | Download |
| fcs | conference-paper | 2017 | image-processing | |||
Salient Object based Action Recognition using Histogram of Changing Edge Orientation (HCEO) | "Hnin Mya Aye Sai Maung Maung Zaw" | conference paper | 2015 | August | Cloud Computing | FCS | Action Recognition, HCEO, HOF,SVM | Download |
| fcs | conference-paper | 2015 | cloud-computing | |||
A Survey on Object Detection, Classification and Tracking Methods | "Hnin Mya Aye Si Si Mar Win" | conference paper | 2015 | August | Image Processing | FCS | Object Detection, Object Classification, Object Tracking | Download |
| fcs | conference-paper | 2015 | image-processing | |||
A Model for Mobile Learning Applications on Virtual Private Cloud | "Si Si Mar Win, Hnin Mya Aye " | conference paper | 2015 | February | Cloud Computing | FCS | - | Download |
| fcs | conference-paper | 2015 | cloud-computing | |||
Study on Cryptographic Algorithms for Cloud Data Security | "Hnin Mya Aye, Si Si Mar Win, Thin Thin Soe" | conference paper | 2015 | February | Cloud Computing | FCS | cloud computing, security issues, cryptography, encryption, decryption | Download |
| fcs | conference-paper | 2015 | cloud-computing | |||
"Nation Building Through Lends a Hand of ICT Innovation: Preliminary Approach to the Multilingual Dictionary for the Prosperity of the Shan State" | Amy Aung, Yuzana, Darli Myint Aung, Hsu Mon Kyi, Swe Swe Aung | Proceeding Book | 2019 | May | "machine readable dictionary", Natural Language Processing | FIS | "natural language processing, machine readable dictionary, education. ICT " | Download |
| fis | proceeding-book | 2019 | machine-readable-dictionary natural-language-processing | |||
Effective Atomic Cluster Finding Method for Author Name Disambiguation from Publication Dataset | Amy Aung, May Phyo Thwal | Online Journal | 2014 | November | Name Disambiguation | FIS | Name ambiguity, Clustering based methods | Download |
| fis | online-journal | 2014 | name-disambiguation | |||
Ontology Based Hotel Information Extraction from Unstructured Text | Amy Aung, May Phyo Thwal | Online Journal, Proceeding Book | 2014 | March(29-30) | Ontology based Information Extraction | FIS | "attribute value extraction, concept identification, ontology based information extraction, pattern matching techniques,triplet extraction algorithm" | Download |
| fis | online-journal proceeding-book | 2014 | ontology-based-information-extraction | |||
Integration Approach for Relational Database to Ontology Generation | Amy Aung, May Phyo Thwal | Proceeding Book | 2013 | December,9-10 | Relational Database to Ontology Generation | FIS | "Ontology; Database; Generation, Mapping Analysis of Ontology and Database, Construction Rules " | Download |
| fis | proceeding-book | 2013 | relational-database-to-ontology-generation | |||
Classification of Road Traffic Accidents Using (CART) Adaptive Regression Trees | Ei Shwe Zin Naing, Yu Ya Win | Local Journal | 2019 | July | Data Mining | FCS | CART, Gini | Download | Road traffic accidents are amongthe top leading causes of deathsand injuries of all age. The cost | fcs | local-journal | 2019 | data-mining | |||
Paper Retrieval System using Dice Coefficient | Yin Wai Lwin | Local Journal | 2019 | August | Data Mining | FIS | Q-gram, Maximum consecutive longest common subsequence, dice, string metrics | Download | Redundant methods or redundant algorithm can be applied in preceding papers for new paper publication. This system presents several string metrics, such as Q-gram, maximum consecutive longest common subsequence (MCLCS) and Dice coefficient, etc. If the two texts have some words in common, this system can measure how similar the order of common-words is in two texts. In this system, user has to enter at least one query word to retrieve related paper titles. This system provides the user with the nearest relevant paper titles in rank even if user enters at least one query word. Experimental results of string distance metrics (MCLCS and Dice) on real data are provided and analyzed. This system will display the similar text of methods, algorithm and application comparing with current paper and preceding papers. The preceding papers are now collecting in AICT, ICCA and PSC. | fis | local-journal | 2019 | data-mining | |||
Feedback for Teachers’ Performance Using Decision Tree and Neural Network | Soe Moe Aye, Soe Soe Nwe | Local Journal | 2019 | December | Data Mining | FIS | Q-gram, Maximum consecutive longest common subsequence, dice, string metrics | Download | As much as it is important for the institutions to evaluate the performance of the teachers it is equally important to measure the output of the teachers. Teachers are one of the weightiest assisting factors towards the process of effective learning. Accordingly, teachers are to perceive the nature and signature of student, also to pore over the student trueness, student fulfillment of a need, service quality, relationship commitment and hope. Feedback system is based feedback collecting from the students and provides the automatic generation of a feedback which is given by students. Teachers’ evaluation search to enhance the teacher own practice by identifying pros and cons for development of future education. It is schemed at guarantee that teachers perform at their best to better student learning. Data mining applications play a significance role in working out educational puzzling circumstance in higher education. In this day and age, Educational data mining is a becoming prominent discipline concerned with different approaches contains predicting teachers’ performance and improve the quality of education process to raise up students’ achievement. The system purposes at utilization the classification methods of Data Mining for the foretelling of teachers’ performance. The Artificial Neural Network (ANN) technique based on backpropagation and Decision Trees method explicitly C4.5 algorithm were employment and their accuracy were assessed the similarities and differences to each other. | fis | local-journal | 2019 | data-mining | |||
Implementation of Voice Recognition System for Real Time Using MFCCs and GLA | Moe Thuzar Htwe | Internaional conference paper | 2009 | Feb26th, 27th | Signal Processing | FCST | MFCCs, GLA, MATLAB | Download |
| fcst | internaional-conference-paper | 2009 | signal-processing | |||
Gas Leakage Detector by Using Arduino UNO & MQ-2 Sensor | Moe Thuzar Htwe | Journal | 2019 | December | Embedded System | FCST | Arduino UNO, CNG, LPG, MQ-2 | Download |
| fcst | journal | 2019 | embedded-system | |||
A Comparison of Online and Traditional Tests: Reading Comprehension of the Students at the University of Computer Studies, Pyay | Mya Sandar , Kyu Kyi Win, Chaw Su Hlaing | Journal | 2020 | May | Literature Learning and Teaching | Language(English) | online, paper-based reading, pros, cons, comprehension, exactness, perspective | Download |
| languageenglish | journal | 2020 | literature-learning-and-teaching | |||
The Importance of Learning Collocations in English Language Learning through Practical Activities | Thaung Thaung New , Yin Yin Aye , Chaw Su Hlaing | Journal | 2020 | June | Language Education | Language(English) | Learning collocations; Vocabulary development; Strategies; Language learning | Download |
| languageenglish | journal | 2020 | language-education | |||
A Study on Students’ Perceptions of their Experiences in Making Oral Presentation | Pale Mon , Chaw Su Hlaing, Phyo Ei Thu | Journal | 2020 | May | Literature Learning and Teaching | Language(English) | perception, experiences, difficulties, oral presentation | Download |
| languageenglish | journal | 2020 | literature-learning-and-teaching | |||
Learning Strategies for Vocabulary: A Vital Element of Language Learning | Chaw Su Hlaing, Mya Sandar, Pale Mon | Journal | 2020 | June | Language Education | Language(English) | vocabulary, definition of vocabulary, strategies, vocabulary development | Download |
| languageenglish | journal | 2020 | language-education | |||
Research and development of the stabilization of a closed-loop stepper motor control system | Soe Lin Aung | International Journal | 2006 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2006 | information-security | |||
Analyzing speed characteristics of a closed-loop stepper motor control system | Soe Lin Aung | International Journal | 2006 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2006 | information-security | |||
Design and implementation of the stepper motor devices in Matlab | Soe Lin Aung | International Paper | 2006 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2006 | information-security | |||
Off-line Signature Verification using thresholding Technique | Htight Htight Wai, Soe Lin Aung | International Journal | 2014 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2014 | information-security | |||
Perceptual Grouping with Region Merging for Automatic Image Segmentation | Tin Tin Htar, Soe Lin Aung | International Journal | 2014 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2014 | information-security | |||
Enhancement of region merging algorithm for image segmentation | Tin Tin Htar, Soe Lin Aung | International Paper | 2014 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2014 | information-security | |||
Feature Extraction for off-line Signature Verification | Htight Htight Wai, Soe Lin Aung | International Journal | 2013 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2013 | information-security | |||
Offline signature verification system using neural network | Htight Htight Wai, Soe Lin Aung | International Paper | 2014 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2014 | information-security | |||
Automatic image segmentation using marker-controlled watershed transform and region mergion | Tin Tin Htar, Soe Lin Aung | International Paper | 2013 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2013 | information-security | |||
Image Segmentation based on Region Merging | Tin Tin Htar ,Soe Lin Aung | International Journal | 2013 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2013 | information-security | |||
Meaningful region merging approach in image segmentation | Tin Tin Htar, Soe Lin Aung | International Paper | 2013 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2013 | information-security | |||
Offline signature verification system | Htight Htight Wai, Soe Lin Aung | International Paper | 2013 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2013 | information-security | |||
Automatic Closed-loop stepper motor control system with Intra Step-by-step discrete correction of speed | soe lin aung, Dubovoi N.D.,Demkin V.I | International Journal | 2008 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2008 | information-security | |||
Controlling the speed ratio of a closed-loop control system with two stepper motors | soe lin aung, Dubovoi N.D., Demkin V.I | International Journal | 2007 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-journal | 2007 | information-security | |||
Designing Graphical User Interface for automatic control systems with stepper motors | Soe Lin Aung | International Paper | 2008 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2008 | information-security | |||
Research and Development of the stabilization of the speed of closed -loop stepper motors control systemwith intra-step- by-step correctionof speed algorithm | Soe Lin Aung | International Paper | 2007 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2007 | information-security | |||
Research and Development of the ratio of the speeds of two closed- loop stepper motors | Soe Lin Aung | International Paper | 2007 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2007 | information-security | |||
Using factorial experiment for analyzing the speed stabilization closed-loop stepper motor | Soe Lin Aung | International Paper | 2007 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2007 | information-security | |||
Research and development of closed-loop stepper motor control system in different types of switching | Soe Lin Aung | International Paper | 2006 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2006 | information-security | |||
Controlling the speed of stepper motor in non-contact direct current mode | Soe Lin Aung | International Paper | 2006 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2006 | information-security | |||
Research and Development of Automatic Control Systems using Electronics Workbench and Matlab | Soe Lin Aung | International Paper | 2005 | - | Information Security | UCS(Mgy) | - | Download | – | ucsmgy | international-paper | 2005 | information-security | |||
ဗေဒါလမ်းကဗျာမှ ဘဝအားမာန် | Thein Zaw Win, War War Soe, Htay Htay Aung | Local Journal | 2020 | September | Literature (Poem) | Language(Myanmar) | အားမာန်၊ ခေတ်စမ်း၊ ဗေဒါ၊ ဒီ၊ ကျူ။ | Download | ဤစာတမ်းသည် ဆရာဇော်ဂျီ၏ ကဗျာပေါင်းချုပ်ကို အလေ့လာခံနယ်အဖြစ် သတ်မှတ်၍ | languagemyanmar | local-journal | 2020 | literature-poem | |||
ခင်ခင်ထူး၏ 'ကျေးတစ်ရာ ရသစာစု များ'မှ ထိန်းသိမ်းအပ်သော မြန်မာ့ယဉ်ကျေးမှုများ | War War Soe, Htay Htay Aung, Thein Zaw Win | Local Journal | 2020 | July | Literature (Culture) | Language(Myanmar) | ရိုးရာ၊ ဓလေ့၊ ရသ၊ ယဉ်ကျေးမှု၊ ပွဲတော်။ | Download | ဤစာတမ်းသည် မြန်မာ့ရိုးရာ ယဉ်ကျေးမှု အမွေအနှစ်များ ထိန်းသိမ်း စောင့်ရှောက်သင့်ကြောင်း | languagemyanmar | local-journal | 2020 | literature-culture | |||
ခင်ခင်ထူး၏ ဖက်စိမ်းကွမ်းတောင် ရွှေဝတ္ထုတိုများအနက် ခရီးဖော်ဝတ္ထုတို လေ့လာချက် | Thein Zaw Win, War War Soe, Htay Htay Aung | Local Journal | 2020 | June | Literature (Novel) | Language(Myanmar) | ရည်ရွယ်ချက်၊ ဇာတ်လမ်း၊ ဇာတ်ဆောင်၊ နောက်ခံဝန်းကျင်။ | Download | ဤစာတမ်းသည် ခင်ခင်ထူး၏ ဖက်စိမ်းကွမ်းတောင် ရွှေဝတ္ထုတိုများအနက် ‘ခရီးဖော်’ဝတ္ထုကို | languagemyanmar | local-journal | 2020 | literature-novel | |||
Performance Analysis of a QAPF Scheduling Scheme in LTE Network | Zin Mar Myo, Zar Lwin Phyo, Aye Thida Win | Online Publication, Proceeding Book | 2019 | December | Mobile Network Computing | FCS | LTE, Multimedia Services, OFDMA, QAPF, TDMA | Download | Long Term Evolution (LTE) is a cellular network that operates completely in packet domain. It can also support multimedia services. Due to this nature, provisioning the Quality of Service (QoS) requirements has become a challenge to the design of scheduler. Especially, the scheduler must guarantee for transmitting the real-time traffics such as VoIP (voice over IP). In this paper, a scheduler that satisfies the different QoS requirements is presented. This scheduler considers the additional QoS consideration to the Proportional Fair (PF), which is a well-known scheduling algorithm. As the core work of this paper, its performance is evaluated by comparing with the existing well-known schedulers. For non-real-time traffics such as file download, the performance of the scheduling scheme is evaluated by comparing with PF scheduler. For real-time traffics such as video live streaming, its performance is compared with Frame Level Scheduler (FLS). | fcs | online-publication proceeding-book | 2019 | mobile-network-computing | |||
မြန်မာကဗျာနှင့် သင်္ကေတအဖွဲ့ | War War Soe, Htay Htay Aung, Thein Zaw Win | Local Journal | 2020 | June | Literature (Poem) | Language(Myanmar) | ကဗျာ၊ သင်္ကေတ၊ ရသ၊ ဖန်တီးသူ၊ ခံစားမှု။ | Download | ဤစာတမ်းသည် မြန်မာကဗျာများတွင် တွေ့ရသော သင်္ကေတအဖွဲ့ ထင်ဟပ်နေသည့် ကဗျာများကို | languagemyanmar | local-journal | 2020 | literature-poem | |||
Replacing Same Meaning in Sentences Using Natural Language Understandig | Tin Htar Nwe , Zar Lwin Phyo, Zin Mar Myo, Aye Thida Win | Online Publication | 2019 | August | Natural Language Processing | FCS | NLP, A chunk based syntax analyzer, Matching technique, Intelligence methods | Download | NLP (Natural Language Processing) can be used to communicate with computers by means of intelligence methods in a natural language. In other words, it is very useful for classification and analysis. Although there are many natural language syntax analyzers that existed before, it still remains to fulfill the requirements for analyzing English text for English to English Machine Translation. In this paper, we have proposed a chunk-based analyzer for English to English Machine Translation System. The keyword search Technique is one of the techniques of Natural Language Understanding. A simple keyword based matching technique is used for classification. Domainspecific dictionaries of keywords are used to reduce the dimensionality of feature space. The output result is that the word matched to a known word will be replaced in the given sentence, which will not be changed the original meaning. | fcs | online-publication | 2019 | natural-language-processing | |||
Document Clustering by using EM clustering algorithm based on K-Means | Theingi Aung | Proceeding Book | 2013 | February | Data Mining, Web Mining | FCS | - | Download | This paper implements a clustering approach that explores both the content and the structure of XHTML and XML documents for determining similarity among them. A conventional web page clustering technique is utilized to reveal the functional similarity of web pages. In this system, the content and the structure information of the documents are handled by using two different similarity measuring methods. The similarity values produced from these two methods are then combined with weightings to measure the overall document similarity. Text files, HTML, XHTML and XML documents are used as the inputs in this system. Clustering of the text files and HTML documents is based on the content–only information. Both the content and structural information are retrieved according to the XML and XHTML documents clustering processes. Expectation Maximization (EM) clustering algorithm based on k-Means is employed to obtain the document clusters. | fcs | proceeding-book | 2013 | data-mining web-mining | |||
Text Classification using Vector Space Model and K-Nearest Neighbor Algorithm | Hnin Wut Yee, Khin Sein Hlaing | University Journal Paper | 2019 | December | Data Mining, Machine Learning | FIS | frequency, euclidean distance, svm | Download | Text classification is one of the well-studied problems in data mining and information retrieval. Text classification which aims to assign a document to one or more categories based on its content is a fundamental task for web and/or document data mining application. Text classification makes the classification process fast and more efficient since it automatically categorizes documents. In text classification, term weighting between different words is calculated with vector space model. All documents are processed by vector space model to form tf-idf and documents are assigned to the class that corresponds to its least value of distance vector, as measured by k-nearest neighbor algorithm. | fis | university-journal-paper | 2019 | data-mining machine-learning | |||
Encrypted Session Key Exchange and Authentication (ESKEA) Based on DIFFIE-Hellman Protocol | Thidar Htun, Than Naing Soe | Local Conference Paper | 2010 | December | Cryptography | FIS | pseudorandom number generator(PRNG), encrypted session key exchange and authentication protocol(ESKEA), public key encryption(RSA), pseudorandom number generator(RC4) | Download | Key management plays a fundamental role in cryptography as the basis for securing cryptographic techniques providing confidentiality, entity authentication,data origin authentication, data integrity, and digital signatures. And the key exchange protocol is also an essential mechanism for any symmetric cipher. The strength of any cryptographic system relies on efficient key distribution technique. However the main benefit of conventional (symmetric) encryption is its processing speed, the major drawback becomes its secret-key distribution. So, combining Diffie-Hellman protocol with public key encryption and using pseudorandom number generator (PRNG) for generating secret random numbers and random test strings will enhance security level of session key distribution. In our proposed system, the Encrypted Session Key Exchange and Authentication protocol (ESKEA) will be developed, based on Diffie-Hellman key exchange protocol to distribite the generated session key in secure manner by using RSA public key encryption (for secure key exchange) and RC4 pseudorandom number generator (for generating secret random numbers and random test strings). | fis | local-conference-paper | 2010 | cryptography | |||
Mining Quatitative Characteristics Rule By Using Attribute-Oriented Induction | Ei Mon Than,Ingyin Oo | Proceeding Book | 2010 | 10 December | Data Mining | FCS | Data Mining, attribute oriented induction, data generalization | Download | Data mining or knowledge discovery in database is the search for relationship and global patterns that exists in large database. Domain konwledge in the form of concept hierarchies helps to organize the concepts of the attributes in the database relations. Data generalization summarizes data by replacing low level values with higher level concepts. In this paper, the student data set is generalized by using attribute-oriented induction. This method helps to organize the concepts of the attributes in the student database. This paper is intended to develop an attribute-oriented induction method for knowledge discovery in database and to discover quantitative characteristics rules using the attribute-oriented approach. The output is presented in the form of generalized relations or rule forms. | fcs | proceeding-book | 2010 | data-mining | |||
Development of Recommendation System for Access to Web Sites | Ei Ei Han,Than Nwet Aung | CD (Local Conference) | 2008 | December | Web Mining | FCS | - | Download | Web usage mining is one of the categories of web mining task to provide recommendation. Building profiles of registered users is important for collecting information. User profiling is to provide users with what they want without asking for it explicitly. From previous browsing history, the user can know which sites he or she accessed and log-in time for the web sites. From the recommendation systems, web users can know which sites are suitable for them and can save searching time. Collaborative filtering is one type of recommendation systems. It groups users with similar interests and recommends the active user who has the same group based on these neighbor’s interest items. In this paper, we propose a recommendation system for a web site to deliver relevant information and to effectively access data from worldwide sources. The user can reduce searching time and reduce information overload. | fcs | cd-local-conference | 2008 | web-mining | |||
Analyzing and Classifying Web Application Attacks | Ei Ei Han | Conference, Proceeding Book | 2015 | February | Mining and Security | FCS | - | Download | Web application attack detection is one of the popular research areas during these years. SQL injection, XSS and path traversal attacks are the most commonly occurred types of web application attacks. The proposed system effectively classifies three attacks by random forest algorithm to ensure reasonable accuracy. Request length module is computed based on the certain length of the URL to analyze each record as normal or attack. Regular pattern analysis is emphasized on the content of URL and other features to analyze the certain attack patterns. ECML/PKDD standard web attack dataset is used in this system. Combination of random forest algorithm with request length and regex pattern analysis is proposed to outperform the accuracy. | fcs | conference proceeding-book | 2015 | mining-and-security | |||
Classification of SQL Injection, XSS and Path Traversal for Web Application Attack Detection | Ei Ei Han,Thae Nu Phyu | Conference, Proceeding Book | 2016 | February | Mining and Security | FCS | - | Download | This paper compares two approaches of random forests and K-Means+ID3 algorithms for classifying web application attacks. In the first method, Random Forest algorithm is used for the classification of web attacks. In the second method, the k-Means clustering method first partitions the training instances into k clusters using Euclidean distance similarity. On each cluster, an ID3 decision tree is built. To obtain a final decision on classification, the decision of the k-Means and ID3 methods are combined using two rules: (1) the Nearest-neighbor rule and (2) the Nearest-consensus rule. This paper also describes comparison results of these two approaches. | fcs | conference proceeding-book | 2016 | mining-and-security | |||
Detection of Web Application Attacks with Request Length Module and Regex Pattern Analysis | Ei Ei Han | Conference, Proceeding Book | 2015 | August | FCS | - | Download | Web application attack detection is one of the popular research areas during these years. Security for web application is necessary and it will be effective to study and analyze how malicious patterns occur in web server log. This system analyzes web server log file, which includes normal and malicious users’ access patterns with their relevant links. This uses web server log file dataset for the detection of web application attacks. This system intends to analyze normal and attack behaviors from web server log and then classify attack types which are included in the dataset. In this system, three types of attacks are detected namely, SQL injection, XSS and directory traversal attacks. Attack analysis stage is done by request length module and regular expressions for various attack patterns. | fcs | conference proceeding-book | 2015 | |||||
Performance Analysis of a QAPF Scheduling Scheme in LTE Network | Zin Mar Myo, Zar Lwin Phyo, Aye Thida Win | Online Publication, Proceeding Book | 2019 | December | Mobile Network Computing | FCS | LTE, Multimedia Services, OFDMA, QAPF, TDMA | Download | Long Term Evolution (LTE) is a cellular network that operates completely in packet domain. It can also support multimedia services. Due to this nature, | fcs | online-publication proceeding-book | 2019 | mobile-network-computing | |||
Replacing Same Meaning in Sentences Using Natuaral Language Understanding | Tin Htar Nwel, Zar Lwin Phyo, Zin Mar Myo, Aye Thida Win | Online Publication | 2019 | August | Natural Language Processing | FCS | NLP, A chunk based syntax analyzer, Matching technique, Intelligence methods | Download | NLP (Natural Language Processing) can be used to | fcs | online-publication | 2019 | natural-language-processing | |||
Performance Analysis of EXP-BET Algorithm for Triple Play Service in LTE System | Ku Siti Syahidah Ku Mohd Noh, Darmawaty Mohd Ali, Zin Mar Myo | Online Publication | 2016 | 25 May | Mobile Network Computing | FCS | LTE, Packet Scheduling Algorithm, Exponential Blind Equal Throughput, LTE-Sim | Download | Quality of Service (QoS) is defined as user’s satisfaction towards service performance that has | fcs | online-publication | 2016 | mobile-network-computing | |||
Genetic Algorithm-Based Feature Selection and Classification of Breast Cancer Using Bayesian Network Classifier | Yi Mon Aung | University Journal Paper | 2011, 2020 | September | Data Mining | FIS | Genetic Algorithm; Classification; Bayesian Network; Feature Selection | Download | Recently, large amounts of data are widely accessible in information structures, and students have attracted great attention of academics to turn such data into useful knowledge. Researchers also need related data from vast records of patients using the feature selection method. The selection of features is the process of identifying the most important attributes and removing redundant and irrelevant attributes. The system implements obtaining information in the original data set without taking into account class labels to create the best functional subset using information gain and Pearson correlation. This system was tested on a chronic kidney disease dataset obtained from the UCI machine learning repository. The best data on chronic kidney disease with all the functions using data mining algorithms such as Naive Bayes, Multilayer Perceptron (MLP), J48, K Nearest Neighbor (KNN) to test the effectiveness of the system. | fis | university-journal-paper | 2011 2020 | data-mining | |||
Analysis of Signal Variation Based on Path Loss in LTE Network | Zin Mar Myo, Myat Thida Mon | Online Publication, Proceeding Book | 2015 | 29 August | Mobile Network Computing | FCS | LTE, Path loss, nonGBR | Download | Long Term Evolution (LTE) network has a drastic development in the field of telecommunication broadband wireless network. It uses several | fcs | online-publication proceeding-book | 2015 | mobile-network-computing | |||
Performance Analysis of a Scheduler for Multiple Traffics of LTE Network | Zin Mar Myo, Myat Thida Mon | Proceeding Book | 2015 | 6 February | Mobile Network Computing | FCS | - | Download | Long Term Evolution(LTE)can support multimedia services.To guarantee the different requirements of the different services, packet scheduler plays an important role in LTE. Especially, the additional challenges are exposed to the design of scheduler when real time traffics such as VoIP (voice over IP) are transmitted over the LTE network.In this paper, a new scheduler is proposed for satisfying the | fcs | proceeding-book | 2015 | mobile-network-computing | |||
QoS Aware Proportional Fair (QAPF) Downlink Scheduling Algorithm for LTE Network | Zin Mar Myo, Myat Thida Mon | Online Publication, Proceeding Book | 2015 | 5 January | Mobile Network Computing | FCS | LTE, QoS, GBR, nonGBR, QAPF | Download | Long Term Evolution (LTE) supports several QoS (quality of services) classes and tries to guarantee their requirements. There are two main different QoS classes: Guaranteed Bit rate (GBR) such as VoIP and non-Guaranteed Bit Rate (non-GBR) such as FTP or HTTP. Having these different QoS requirements in packet domain introduces an additional challenge on the LTE MAC scheduler design. Therefore, the scheduler has to be aware of the different service requirements and satisfy them. In this paper, QoS aware proportional fair downlink scheduler (QAPF) is proposed. It can optimize the use of available resources while maintaining QoS requirements of different service classes. The result willshow the performance evaluation of the proposed scheduler by comparing with others. | fcs | online-publication proceeding-book | 2015 | mobile-network-computing | |||
Analytical Model of the LTE Radio Scheduler for non-GBR Bearer | Zin Mar Myo, Myat Thida Mon | Proceeding Book | 2014 | February | Simulation &Modeling | FCS | - | Download | Long Term Evolution (LTE) is a mobile network | fcs | proceeding-book | 2014 | simulation-modeling | |||
Consultation about the Related Frequent Patterns for Market Basket Analysis | Zin Mar Myo, May Phyo Oo | Proceeding Book in Soft Version | 2008 | October | Data Mining | FCS | - | Download | In this paper, frequent patterns are generated by using association rule mining algorithm without | fcs | proceeding-book-in-soft-version | 2008 | data-mining | |||
Performance Analysis of a QAPF Scheduling Scheme in LTE Network | Zin Mar Myo, Zar Lwin Phyo, Aye Thida Win | Online Journal | 2019 | December | Network and Information Security | FCS | LTE, Multimedia Services, OFDMA,QoS | Download | Long Term Evolution (LTE) is a cellular network that operates completely in packet domain. It can also support multimedia services. Due to this nature, provisioning the Quality of Service (QoS) requirements has become a challenge to the design of scheduler. Especially, the scheduler must guarantee for transmitting the real-time traffics such as VoIP (voice over IP). In this paper, a scheduler that satisfies the different QoS requirements is presented. This scheduler considers the additional QoS consideration to the Proportional Fair (PF), which is a well-known scheduling algorithm. As the core work of this paper, its performance is evaluated by comparing with the existing well-known schedulers. For non-real-time traffics such as file download, the performance of the scheduling scheme is evaluated by comparing with PF scheduler. For real-time traffics such as video live streaming, its performance is compared with Frame Level Scheduler (FLS). | fcs | online-journal | 2019 | network-and-information-security | |||
Replacing Same Meaning in Sentence Using Natural Language Understanding | Tin Htar New, Zar Lwin Phyo, Zin Mar Myo | Online Journal | 2018 | August | NLP | FCS | NLP, A chunk based syntax analyzer,Intelligence methods,Machine Technique | Download | NLP (Natural Language Processing) can be used to communicate with computers by means of intelligence methods in a natural language. In other words, it is very useful for classification and analysis. Although there are many natural language syntax analyzers that existed before, it still remains to fulfill the requirements for analyzing English text for English to English Machine Translation. In this paper, we have proposed a chunk-based analyzer for English to English Machine Translation System. The keyword search Technique is one of the techniques of Natural Language Understanding. A simple keyword based matching technique is used for classification. Domainspecific dictionaries of keywords are used to reduce the dimensionality of feature space. The output result is that the word matched to a known word will be replaced in the given sentence, which will not be changed the original meaning | fcs | online-journal | 2018 | nlp | |||
Sentence Level Reordering System for Myanmar-English Machine Translation System | Aye Thida Win | Online Journal | 2013 | May | NLP | FCS | Machine Translation, Sentence level reordering, HMM | Download | Machine translation is an application of Natural Language Processing (NLP) technologies. The main issue of machine translation lies in how to map characteristics of source language (SL) to target language (TL). Languages have their own components, expressions, and word order to construct a correct order sentence. Reordering is needed in machine translation when we translate from one language to another to get correct order. In this paper, we describe rule-based reordering system for Myanmar-English sentence level reordering (MESLR) system. Reordering is important reverse words from translation process for Myanmar-English machine translation to get proper English sentence. In this paper, we generated POS movement rules, define function tag algorithm and function tag movement rules. The main process of this paper are splitting and reordering process. In the splitting process, we proposed algorithm for define function tag in the simple sentence and phrase identification algorithm to define function tag for the ambiguity sentences from Myanmar to English translation system. In the reordering process include two steps word level reordering (WLR) and phrase level reordering (PLR). | fcs | online-journal | 2013 | nlp | |||
Syntactic Reordering Approach for Myanmar-English Machine Translation System | Aye Thida Win | Online Publication | 2013 | 13-15 September | NLP | FCS | Syntactic MT, Semantic MT, Reordering | Download | In this paper, we present reordering approach which can be reordered resemble sentence from translation process. Translated word and POS’s tag with noun phrase and verb phrase are entered as input process. In Machine Translation (MT), one of the main problems to handle is word reordering. In Myanmar to English translation, word level (WLR), phrase level (PLR) and clause level (CLR) reordering are crucial important to get the correct order sentence. In this paper described Myanmar to English reordering system. This system includes two phases: Splitting sentence and Reordering sentence. In splitting sentence phase implement proposed algorithm and phrase identification algorithm for split and define function tag based on the Myanmar-English grammar patterns. The reordering sentence phase includes three process WLR, PLR and CLR. When we translated from Myanmar to English, translated words are also reverse within each phrase and such phrases are also reverse in the sentence. Some Myanmar sentences are compound sentence structure. When reordering translated compound Myanmar sentence to get the correct English order sentence must reorder as the clause sentence by the target sentence side. So, CLR algorithm is needed for translated compound Myanmar sentence. Experiments are carried out four related NLP task: WLR, PLR, CLR and function tagging, illustrating the effectiveness of the POS movement rules and algorithms. | fcs | online-publication | 2013 | nlp | |||
Proposed Myanmar Word Tokenizer based on LIPIDIPIKAR Treatise | Thein Than Thwin, Aye Thida Win, Pyho Phyo Wai | Online Publication | 2010 | 16-18 April | NLP | FCS | Tokenization, phonetic of myanmar words, LIPIDIPIKAR Treatise | Download | Natural Language Processing (NLP) based technologies are now becoming important and future intelligent systems will use more of these techniques as the technology is improving explosively. But Asia becomes a dense area in NLP field because of linguistic diversity. Many Asian languages are inadequately supported on computers. Myanmar language is an analytic language but it includes special character like killer, medial, etc.. In English or European languages, all of the syllables are formed by combining the alphabets that represent only consonants and vowels but Myanmar language uses compound syllables that make more difficult to analyze. So we can face difficulties in word sorting. In our proposed system, the condensed form of Myanmar ordinary scripts will be transformed into analyzable elaborated scripts based on LIPIDIPIKAR treatise written by Yaw Min Gyi U Pho Hlaing. These elaborated words can be easily sorted by using this treatise. In our proposed system, complexity of Myanmar condensed words sorting compared with complexity of elaborated words sorting. | fcs | online-publication | 2010 | nlp | |||
Word to Phrase Reordering Machine Translation System in Myanmar-English | Aye Thida Win | Online Publication | 2011 | 11-15 March | NLP | FCS | Word Reordering, Phrase Reordering, Machine Translation | Download | In machine translation (MT), one of the main problems to handle is word reordering. This paper focuses to design and implement an effective machine translation system for Myanmar to English language. . The framework of this paper is reordering approach for English sentence. We propose an approach to generate the target sentence by using reordering model that can be incorporated into the Statistical Machine Translation (SMTS). Myanmar sentence and English sentence are not semantic. In this paper, we present Myanmar to English translation system that is our ongoing research. Input process, tokenization, segmentation, translation and English sentence generation include in this system. In this paper, we describe about the English sentence generation. The aim of this paper is to reassemble the English word into proper sentence. The resulted raw sentence from translation process is reassembling to form the English sentence. Subject/verb agreement process, article checking process and tense adjustment process will also be performed according to the English grammar rules. The English sentence generation is proper for Myanmar to English translation system | fcs | online-publication | 2011 | nlp | |||
Clause Level Reordering for Myanmar-English Translation System | Aye Thida Win | Proceeding Book | 2012 | 28-29 February | NLP | FCS | Myanmar-English Machine Translation, Clause Level Reordering | Download | Machine Translation (MT), one of the main problems to handle is word reordering. Myanmar Language and English Language are linguistically different language pairs. Myanmar language is a verb fibal language and English language is a verb initial language. After Myanmar to English translation process, translated English words are needed to reorder to produce proper order of English sentence. Sentence level reordering system consists of word level, phrase level and clause level reordering processes. In order to get the correct order of English sentence, we propose Clause Level Reordering (CLR) algorithm and article checking algorithm for Myanmar to English translation system by mapping English grammar patterns. CLR algorithm can reorder the disorder words and it can also add relative words which are not contain in the translated sentence. Article missing words are added by using Article Checking Algorithm. We evaluate the effectiveness of proposed CLR algorithm with compound and complex English sentence. | fcs | proceeding-book | 2012 | nlp | |||
Phrase Reordering Translation in Myanmar-English | Aye Thida Win | Proceeding Book | 2011 | 5-6 May | NLP | FCS | Machine Translation, Phrase Reordering | Download | Machine Translation is the attempt to automate all or part of the process for translation from one human language to another. This definition involves accounting for the grammatical structure of each language and using rules and grammars to transfer the grammatical structure of the source language (SL) into the target language (TL). Myanmar to English machine translation can be used to facilitate learning in beginner of MyanmarEnglish language learner or vice versa and to help them to study of grammar, Myanmar and English languages are linguistically different language pairs. The aim of this paper is to reassemble from the not ordering set of English word into proper English sentence. In this paper proposed the position of English POS tag rules. The resulted raw sentence from translation process is reassembling to form the English sentence. In this system, especially we consider subject/verb agreement process, article checking process and tense adjustment process will also be performed according to the English grammar rules. The proposed system of this paper is reordering approach for English sentence. Our proposed system, we considered the position of English POS tags and then which are swapping to get the proper English sentences by using the reordering rules and mapping the English grammar patterns. | fcs | proceeding-book | 2011 | nlp | |||
Syntactic Reordering Machine Translation System for Myanmar-English | Aye Thida Win | Proceeding Book | 2011 | December | NLP | FCS | Machine Translation, Syntatic reordering | Download | Machine translation is the attempt to automate all or part of the process for translation from one human language to another. In syntax-based statistical translation model operation capture linguistic differences such as word order and case tracking. In Machine Translation (MT), one of the main problem to handel is word reordering. Informally, a word is reordered when it and its translation occupy different positions within the corresponding sentences. Syntactic reordering approaches are an effective method for handling systematic differences in word order between source and target languages within the context of Statistical Machine Translation (SMT) system. This paper applied syntactic reordering to Myanmar-English translatin. In this paper, we presented reordering approach which can be reodered resemble sentence from translation process. Translated word word and POS’s tag with noun phrase and verb phrase are entered as input process. This system reordered raw sentence to get proper English sentence by mapping English grammar patterns. First, movement POS position has based on the correct position text file. Second, define function tag process has based on the reordering algorithm. This system presented reordering pattern and rules of POS position which can be used word level and phrase level. | fcs | proceeding-book | 2011 | nlp | |||
Framework of Phrase Reordering Machine Translation System in Myanmar-English | Aye Thida Win | Proceeding Book | 2010 | December | NLP | FCS | Reordering, Natrual Language Processing, Machine Translation | Download | In Machine translation (MT), one of the main problems to handle is word reordering. This paper focuses to design and implement an effective machine translation system for Myanmar to English language. . The framework of this paper is reordering approach for English sentence. We propose an approach to generate the target sentence by using reordering model that can be incorporated into the Statistical Machine Translation(SMT). In this paper, we present Myanmar to English translation system that is our ongoing research. Input process, tokenization, segmentation, translation and English sentence generation includ in this system. In this paper, we describe about the English sentence generation. The aim of this paper is to reassemble the English word into proper sentence. The resulted raw sentence from translation process is reassembling to form the English sentence. Subject/Verb agreement process, article checking process and tense adjustment process will also be performed according to the English grammar rules. The English sentence generation is proper for Myanmar to English translation system. | fcs | proceeding-book | 2010 | nlp | |||
Online Asean Directory System Based On Mobile Agent | Ei Khaing Zaw ,Zaw Win Myint | Proceeding of International Conference | 2012 | December | Multi-Agent System | FCS | Mobile agent; Webpage | Download | Mobile Agent technology has the ability to travel from one host to another in a network and to choose the places they want at the same time. Proposed systims are computational software processes capable of roaming World Wide Web, interacting with foreign hosts, gathering information on behalf of its owner,and coming ‘ back home’ after performing the dyties set by its owner. Nowadays , as the amount of information on the Web has increased rapidly, it becomes more difficult for common web users to get information which they reqrire. In order to solve such kinds of problems, information retrieval system based on mobile agent is propose to give the users the relevant information according to his/her location. | fcs | proceeding-of-international-conference | 2012 | multi-agent-system | |||
Review On Continuous Speech Recognition System | Zaw Win Myint, Yin Win Chit, Phyoe Theingi Khaing | Online Publication | 2020 | March | Digital Signal Processing | FCS | Deep Belief Network, Deep Neural Network, Support Vector Machines, Convolutional Neural Network, Artifical Intelligence | Download | This Automatic Speech Recognition (ASR) System translates the human’s speech signal into text words and it has still many challenges in the Myanmar continuous speech signal. The deaf people can’t communicate with each other based on human’s speech and can’t hear broadcast news at every station that need for them in travelling. But deaf people also need to communicate with everybody and need to know about the broadcast news everywhere. This system is design to recognize the greedy words in daily communication for deaf people. First of all, the daily communication words and broadcast news is gathered in a sound database. The audio (.wav) file of daily communication words speech is used as the input of the system. After passing the pre-processing step, these speech audio files are segmented using dynamic thresholding method based on time and frequency domain features. Then important features of segmented speech signal are extracted by Mel Frequency Cepstral Coefficient (MFCC). Especially, DCNN-AlexNet has been applied in image processing because it can perform as a highly accurate, effective and powerful classifier. In the training and classification step of this system, the advantages of DCNN in image processing are applied using the MFCC feature images. In this system, two types of input features are used, the traditional MFCC features and converted MFCC features images from the speech signal (.png format). Then these features are trained to build the acoustic model and are classified using Deep Convolutional Neural Network (DCNN) classifier. Finally, the continuous speech sentence is recognized as Myanmar text using codebook. The experiments shows that the DCNN speech recognition system achieves the average Word Error Rate (WER) of 12.5 % on the MFCC images training dataset and WER of 16.75% on the original MFCC features value training dataset. | fcs | online-publication | 2020 | digital-signal-processing | |||
Agent-Based E-Commerce Workflow System | Wai Mi Mi Thaw ,Zaw Win Myint | Proceeding of International Conference | 2011 | December | Intelligent Agent | FCS | Mobile agent; Web page | Download | In this paper,an agent-based e-commerce workflow system is performed to help in eliminating ptoblems in e-commerce domain by using agent-based approach. In e-commerce,these es always aproblem of searching a right item in less time without involving the contractors. Both intelligence agent and workflow technology have been applied to business process mnagement. Using these two techniques, the market framework offers time saving and flexibility through interaction among the agents. The system in this paper involves order capture process,order processing process and order fulfillment process in purchasing the supermarket items. These processes are provided by order capture agent order process agent,order fulfillment agent and storage agent.In this system, agents perform different functions when it comes to the online order. Agents can provide refined search and purchasing various items in supermarket in order to takecare of the customer needs. The system in this paper utlizes the dataset of KaungMon supercenter in Magway Township. | fcs | proceeding-of-international-conference | 2011 | intelligent-agent | |||
Word Stemming Using Porter Stimming Algorithm | Saw Myat Khaing,Zaw Win Myint | Proceeding of International Conference | 2012 | December | Database Management System | FCS | Stemming technique: Data analyzing | Download | Word stemming is document processing that groyps documents with similar concept. Stemming is very useful and important technique for analyzing data. Porter Stemmer is a very widely used and available. Stemmer and is used in many applications. Stemming algorithms can be used in search engines such as Lycos and Google, and also thesaurases and other products using Natural Languange Processing (NLP) for the purpose of Information Retrieval (IR).IR is essentially a matter of deciding which documents in a collection should be retieved to satisfy a user’s need for information. Stemming algorithm, or stemmer which attempt to reduce a word to its stem or root form has been developded. The key terms of a query of document are represented by stems rather than by the original words. Stemming has many algorithms, among them this system uses porter stemming algorithm. | fcs | proceeding-of-international-conference | 2012 | database-management-system | |||
Agent-Based Auction System For Online Market | Lae Lae Shwe ,Zaw Win Myint | Proceeding of International Conference | 2011 | December | Intelligent Agent | FCS | Contract Net (CNET) Protocol ; Multi agent | Download | In this paper, Contract Net (CNET) Protocol theory in multi-agent systin is applied to improve the auction techniqyes. Using intelligence agent technology, the market framework offers time saving automation of auctions and flexibility throygh negotiations among the agents.Agents may perform different functions when it comes to the online auction. They can participate in auction selected by the user,being responsible for the bidding process of participating agents. The agent-based aution can be used as a proven mechanism for fast and efficient price allocation. The design of auctioneer agent that makes decisions on behalf of seller and buyer agents is also presented. Proposed agent-based auction sysrim is expected to improve the quality of service in electronic commerce. | fcs | proceeding-of-international-conference | 2011 | intelligent-agent | |||
Estimating The Project Duration By Using Critical Path Method | Nyein Zaw Win ,Zaw Win Myint | Proceeding of International Conference | 2010 | December | Software Engineering | FCS | Critical Path ; Tree structure ; Project estimation; Gantt chart | Download | Project scheduling involves the creation of various graphical representations of part of the project plan. These include activity charts showing the interrelationships of project activities. The Critical Path is the longest path with the shortest duration, or the shortest amount of time in which a project can be successfully completed.A delay on any one activityon the Critical Path Method (CPM) computer software packages, only afew minutes are required to input the information and generate the critical path. If the projedt manager wants to meet the deadline of the project completion date, the system provides the supporting information, which provides the best critical path that estimate the completion time of the project. In this paper,the estimation of project duration with the Critical Path is presented.This Critical Path of the given project is shown with tree structure. And then the project estimation is shown with Gantt chart. | fcs | proceeding-of-international-conference | 2010 | software-engineering | |||
Finding Minimum Spanning Tree By Using Prim And Kruskal Algorithms | Khin Thet Mon ,Zaw Win Myint | Proceeding of International Conference | 2010 | December | Artificial Intelligence | FCS | Minimum Spanning Tree; Kruskal; Prim | Download | Finding a minimun spanning tree of a given weighted graph G (V,E) is an important graph problem. A minimum spanning tree is a tree formed from a subset of the edges in a given undirected graph, with tow properties: (1) it spans the graph, i.e, it includes every vertex in the graph, and (2) it is a minimum, i.e, the total weight of all the edges is as low as possible. In this paper, minimum apsnning tree is found in a connected graph with edge weight.For the purpose, Kruskal’s and Prim’s algorithm are applied. Then these two algorithms are compared with weight-graph and run-time graph. The implemented system intends to show a graph theory applide to find shortest path by using a minimum spanning tree. | fcs | proceeding-of-international-conference | 2010 | artificial-intelligence | |||
Prevention for cancer diseases associated with vegetables | Aye Aye Bo | Journal | 2019 | August, Volume 4, Issue 8 | Data Mining | ITSM | Harvard-Led Physicians health, Cancer, Associations, Vegetables | Download | Vegetables are important for human health because of their vitamins, minerals, phytochemical compounds, and dietary fiber content. Especially antioxidant vitamins (vitamins A, vitamins C, and vitamins E) and dietary fiber content have important roles in human health. Adequate vegetable consumption can be protective some chronic diseases such as diabetes, cancer, obesity, metabolic syndrome, cardiovascular diseases, as well as improve risk factors related to these diseases. Fruits and vegetables are universally promoted as healthy. Fruits and vegetables include a diverse group of plant foods that vary greatly in content of energy and nutrients. Fruits and vegetables also supply vitamins and minerals to the diet and are sources of phytochemicals that function as antioxidants, phytoestrogens, and anti-inflammatory agents and through other protective mechanisms. Multivitamins may slightly reduce the risk of cancer but don’t prevent heart disease. There is a wealth of data available within the health care system. Advanced data mining techniques can help medial situations. The Harvard-Led Physicians Health Study II (PHS II) recently found that taking a multivitamin slightly lowers the risk of being diagnosed with cancer. Fruits and vegetables contain many biologically active ingredients that may help to prevent cancer in ways that vitamins and minerals alone do not. The PHS II was the first study to test a standard multivitamin for the prevention of chronic disease. The cardiovascular disease portion of the study focused on whether taking a multivitamin reduced the risk of heart attacks, strokes, and death from cardiovascular disease. It’s important not to overplay the benefit that PHS II found for preventing cancer. What you eat and don’t eat can have a powerful effect on your health, including your risk for cancer. We conducted a systematic review and meta-analysis to clarify these associations. | itsm | journal | 2019 | data-mining | |||
Finding Frequent Itemsets by using Hash-based Technique | Yin Win Chit ,Zaw Win Myint | Proceeding of International Conference | 2010 | December | Data Mining | FCS | Datarbase Management System; Hash based technique | Download | In data mining,finding frequent itemset plays an important role which is used to identify the correlations among the fields of database. This paper is idended to introduce the general concept of frequent itemsets mining. Finding such frequent pattns plays an essential role in mining associations, correlation, clustering and other data mining tasks ass well. In this paper we present an algorithm hash-based which hashing technology to store the database in horizontal data format. This paper is implemented for finding frequent itemsets on crops data set. By using this system user can reduce the size of candidate generation this system improves the efficiency of apriori method by using hash table directly. The main purpose of this paper is to find the optimal item sets by using the hash based technique. | fcs | proceeding-of-international-conference | 2010 | data-mining | |||
Contract Net Protocol based-On Multiagent System for Desirable Jeep Car | Saw Win,Zaw Win Myint | Proceeding of International Conference | 2009 | 30 December | Artificial Intelligence | FCS | Contract Net Protocol ; Multiagent System | Download | This paper use Contract Net Protocol based-on multiagent system for purchasing car system.Normally, buyer look for desire car with search engine or buyer must go every industrial Zone or Company (produce jeep car) for desire jeep car.Perhaps you are Lucky and find a map showing how to get to Industrial Zone Or Company. This system using Contract Net Protocol could solve these problems.Contract Net allows tasks to be distributed among a group of agents.One of the most promising uses for Contract Net is to create an electronic marketplace for buying and selling goods. In this agency system, the buyer/customer certainly goes to this system and he/she can view car design and car data. And then, he/she can choose desire jeep car by selecting car’s items.This system automatically choosing suitable jeep car for user. Not to navigate to the every Industrial Zone or Company because this system is special for customers who will buy Jeep car. | fcs | proceeding-of-international-conference | 2009 | artificial-intelligence | |||
SLA guaranteed migration decision model using MCDM approach | Zar Lwin Phyo | Online Publication, Proceeding Book | 2015 | 29 August | Virtualization | FCS | AHP, PROMETHEE, QoS, SLA, Virtualized Data Center | Download | In Virtualized Data Center (VDC), the workload in each node changes dynamically overtime, so the workload in some machines may exceed the threshold, which not only cannot guarantee the quality of service requirements (QoS), but also waste resources. One of the key benefits of virtualization is reassignment of a virtual machine to another physical host can be done when resource shortage or poor utilization conditions occurs in host. However, in this case, efficient migration decision is required to reduce migration cost and ping-pong effect. In this paper, we propose SLA guaranteed migration decision model for resource management in VDC based on the integrated approach of Analytical Hierarchy Process (AHP) and the Preference Ranking Organization METHod for Enrichment Evaluations (PROMETHEE). In this case, AHP is used to assign weights to the criteria to be used in selection phase, while PROMETHEE is employed to determine the priorities of the | fcs | online-publication proceeding-book | 2015 | virtualization | |||
Comparison of Binning Methods By Using Naïve Bayesian Classification | Thein Kyawe ,Moe Moe Hlaing | Conference | 2010 | December | Data Mining | ITSM | Data Analytics, Naïve Bayes, Binning methods, Hold out | Download | Data Mining is a multidisciplinary field which supports knowledge workers who try to extract information in our “data rich, information poor” environment. Its names stems from the idea of mining knowledge from large amounts of data. The tools of data mining such as Decision Tree Induction, Naïve Bayesian Classification and Genetic Algorithm provide assist us in the discovery of relevant information through a wide range of data analysis techniques. Any method used to extract patterns from a given data source is considered to be a data mining technique. This system classifies the class label of unknown records by using Naïve Bayesian Classification tool. Classification is the forms of data analysis that can be used to extract models describing important data classes. This paper emphasizes on different types of binning methods with numerical data, each of which was tested against the Bayesian classification methodology. Holdout method is used to access the accuracy of the classifier. Testing is made using any data sets. This system implemented by using Microsoft Visual studio 2008 and Microsoft Access tools. | itsm | conference | 2010 | data-mining | |||
Correlation Based VMs Placement Resource Provision | Zar Lwin Phyo, Thandar Thein | Online Publication, Proceeding Book | 2013 | February | Virtualization | FCS | consolidation, resource provisioning, resource utilization, SLA, Virtualized Data Center | Download | In Virtualized Data Center (VDC), a single Physical Machine (PM) is logically divided into one or more Virtual Machines (VMs) that share physical resources. Therefore, dynamically resource provisioning plays an important role in VDC. Moreover the resource provider would like to maximize resource utilization, which forms a large portion of their operational costs. To achieve this goal, several consolidations can be used to minimize the number of PMs required for hosting a set of VMs. However, consolidation is often undesirable for users, who are seeking maximum performance and reliability from their applications. These applications may indirectly increase costs due to under-provisioning of physical resources. Moreover frequent Service Level Agreement (SLA) violations result in lost business. To meet SLA requirements, over provisioning of resources is used. However, if the services do not use all the CPU they have been allocated; the provider will suffer from low resource utilization, since unused resources cannot be allocated to other services running in the provider. Therefore VM provisioning is the most vital step in dynamic resource provisioning. In this paper, correlation based VMs provisioning approach is proposed. Compared to individual-VM based provisioning, correlation based joint-VM provisioning could lead to much higher resource utilization. According to the experimental results, proposed approach can save nearly 50% CPU resource in terms of overall CPU utilization. | fcs | online-publication proceeding-book | 2013 | virtualization | |||
Interactive Tutorial Framework for Online Learning | Min Min Naing , Moe Moe Hlaing | Journal | 2020 | April, 2020 Volume 5, Issue 4 | Web Engineering | ITSM | Interactive, Tutorial, Online Learning | Download | Nowadays, online learning, teaching and online tutorial have become popular as higher education. Online learning is the delivery of learning, training or educational program according to the electronic means. So, this system is intended to develop an interactive tutorial website for online learners. A web based tutorial is a complete program whose purpose is to assist users in learning. It is a method of transferring knowledge, interactive set of instructions to teach by example. The online tutorial framework is the technique of representing a small kind of exam by a computer program. So, this system will examine the student study level by answering the random comprehensive questions. This system enhances the quality and improves the accessibility within education domain. | itsm | journal | 2020 | web-engineering | |||
CPU Usage Prediction Model for Virtualized Data Center | Zar Lwin Phyo, Thandar Thein | Proceeding Book | 2013 | February | Virtualization | FCS | CPU Usage Prediction, Machine Learning, SLA, Virtualized Data Center | Download | In Virtualized Data Center (VDC), a single Physical Machine (PM) is logically divided into one or more Virtual Machines (VMs) that share physical resources. Therefore, dynamically resource provisioning plays an important role in VDC. Moreover the resource provider would like to maximize resource utilization, which forms a large portion of their operational costs. To achieve this goal, several consolidations can be used to minimize the number of PMs required for hosting a set of VMs. However, consolidation is often undesirable for users, who are seeking maximum performance and reliability from their applications. These applications may indirectly increase costs due to under-provisioning of physical resources. Moreover frequent Service Level Agreement (SLA) violations result in lost business. To meet SLA requirements, over provisioning of resources is used. However, if the services do not use all the CPU they have been allocated; the provider will suffer from low resource utilization, since unused resources cannot be allocated to other services running in the provider. Therefore VM provisioning is the most vital step in dynamic resource provisioning. In this paper, correlation based VMs provisioning approach is proposed. Compared to individual-VM based provisioning, correlation based joint-VM provisioning could lead to much higher resource utilization. According to the experimental results, proposed approach can save nearly 50% CPU resource in terms of overall CPU utilization. | fcs | proceeding-book | 2013 | virtualization | |||
Multi Criteria Decision Making for Resource Management in Virtualized Environment | Zar Lwin Phyo, Thandar Thein | Proceeding Book | 2012 | February | Virtualization | FCS | MCDM approach, QoS, SLA, Virtualized Data Center | Download | The workload in each node changes dynamically over time in large-scale data centers, so the workload in some machines may exceeds the threshold, which not only can’t guarantee the quality of service requirements (QOS), may also waste resources. One of the key benefits of virtualization is reassignment of a virtual machine to another physical host can be done when resource shortage or poor utilization conditions occurs in host. In this paper, we proposed the decision support system for resource management in Virtualized Data Center (VDC) based on the integrated approach of Analytical Hierarchy Process (AHP) and the Preference Ranking Organization METHod for Enrichment Evaluations (PROMETHEE). In this case, AHP is used to assign weights to the criteria to be used in selection phase, while PROMETHEE is employed to determine the priorities of the alternatives. | fcs | proceeding-book | 2012 | virtualization | |||
Best resource node selection in Grid Environment | Zar Lwin Phyo | Proceeding Book | 2011 | May | Grid Computing | FCS | Rought Sets,Grid Computing, resource selection | Download | Grid computing can provide abundant resources to assist many studies and it can be employed in more and more projects that have so far yielded numerous findings. However, in grid environment, many distributed resources are integrated in different sites and resources are often shared by multiple user communities and can vary greatly in performance and load characteristics. Therefore, a central problem in grid environment is the selection of computation nodes for execution. Automatic selection of node is complex as the best choice depends on the user request structure as well as the expected availability of computation and communication resources. This paper considers the ongoing research on Rough Sets based selecting the best resource node in computational grid. Our node selection method is based on the CPU capacity, communication bandwidth and memory and disk availability on the resource nodes. The goal of this paper is to enable the automatically select the best available resource node on the network for execution within a reasonable time. In this paper, random data is used to test the validity of proposed method. The result showed that this method can provide the suitable probability of the best resource selection. | fcs | proceeding-book | 2011 | grid-computing | |||
Decision Support System for Dynamic Resource Management in Virtualized Data Center | Zar Lwin Phyo | Proceeding Book | 2011 | December | Virtualization | FCS | AHP, PROMETHEE, QoS, SLA, Virtualized Data Center | Download | Virtualization has many advantages such as less cooling cost, hardware and software cost and more manageability. One of the key benefits is better load balancing by using of Virtual Machine (VM) migration between hosts, however, VM migration depends on an efficient decision support and variety of criteria is required. In this paper, we present an evaluation model for the decision support of VM migration in Virtualized Data Center (VDC) based on the analytical hierarchy process (AHP) and the Preference Ranking Organization METHod for Enrichment Evaluations (PROMETHEE) | fcs | proceeding-book | 2011 | virtualization | |||
Best resource node selection using rough sets theory | Zar Lwin Phyo, Aye Thida | Online Publication | 2011 | March | Grid Computing | FCS | grid computing, rough set, resource selection | Download | In Grid computing, the problem of selecting resources to specific jobs can be very complex, and may require co-allocation of different resources such as specific amount of CPU hours, system memory and network bandwidth for data transfer, etc. Because of the lack of centralized control and the dynamic nature of resource availability, any successful selection mechanism should be highly distributed and robust to the changes in the Grid environment. Moreover, it is desirable to have a selection mechanism that does not rely on the availability of coherent global information. This paper considers selection method in grid environment using rough set theory, which could select the best node in grid environment. The proposed method is designed to achieve the following goals: handling large number of incoming requests simultaneously; assigning each service efficiently to all the incoming requests; selecting the appropriate services for the incoming requests within a reasonable time. Random data is used to test the validity of proposed method in this paper. The result showed that this method can provide the suitable probability of the best node selection. | fcs | online-publication | 2011 | grid-computing | |||
Implementation of Shortest Path Finding System by Using Kruskal Algorithm | Htike Htet Aung , Dr Win Win Zaw | Conference | 2009 | August , 3 | Artificial Intelligence | ITSM | Graphs,shortest path, minimum-cost spanning tree, Kruskal Algorithm | Download | Graphs have been used in a wide variety of application. Some of these applications are analysis of electrical circuits, finding shortest routes, project planning, and identification of chemical compounds, statistical mechanics, genetics, and social sciences and so on. Indeed, it might be well said that of all mathematical structures, graph are the most widely used. This paper is intended to study how a graph theory applied to find shortest path by using a minimum spanning tree. In this study, it is implemented popular locations of the Mandalay City as the vertices of an undirected Graph. In this system, the associated distances between each location are represented as weight of the edges of the graph. There are three different algorithms to obtain a minimum-cost spanning of a connected, undirected graph. Our shortest path finding system is focused on Kruskal Algorithm. Keywords: Graphs, shortest path, minimum-cost spanning tree, Kruskal Algorithm | itsm | conference | 2009 | artificial-intelligence | |||
Quality Analysis of Pseudorandom Number Generator Using Rough Sets | Aye Myat Nyo, Zar Lwin Phyo, May Mar Oo, Chaw Yupar Soe, Thein Than Thwin, Aye Thida, Than Naing Soe | Online Publication | 2010 | June | Cryptography | FCS | seed, pseudorandom sequence, search approach, data mimng, decision rule | Download | In this paper, a rough sets based analyzing system for Pseudorandom Number Generator (pRNG) is proposed to analyze the quality of the pseudorandom number generators. The strength of the cryptosystem relied on the quality of PRNGs. In particular, their outputs must be unpredictable in the absence of knowledge of the inputs and the input can not be guessed. On the other hand, the advance in computer science and technology let to produce the sufficient amount of sequence numbers of all possible input (seeds) and can be stored in a database. By means of the rough set approach, the input (seeds) can be guessed from those databases, using the known output sequence. So, the quality analysis of the (pRNGs) and a simple rule based prediction system is presented in this paper and the design of generators is outside the scope of this paper. | fcs | online-publication | 2010 | cryptography | |||
Predictive maintenance for veheicles services by using data mining techniques | Aye Aye Bo | Journal | 2019 | July, Volume 4, Issue 7 | Data Mining | ITSM | Fleet management systems, Data mining, Maintenance, Vehicle service | Download | A well-planned data classification system makes essential data for easy to use and finds and retrieves the data. At the point, when an individual considers buying a vehicle, there are many aspects that could impact his/her choice on which kind of vehicle he/she is interested in. Even if a brand new motor vehicle, it could be a failure in any component without maintaining and serviced a short period. Vehicle uptime is getting increasingly important as the transport solutions become more complex and the transport industry seeks new ways of being competitive. Traditional Fleet Management Systems are gradually extended with new features to improve reliability, such as better maintenance planning. Typical diagnostic and predictive maintenance methods require extensive experimentation and modeling during development. This paper investigates unsupervised and supervised methods for predicting vehicle maintenance. The methods rely on a telematics gateway that enables vehicles to communicate with a back-office system. These are later associated with the repair history and form a knowledge base that can be used to predict upcoming failures on other vehicles that show the same deviations. Data mining presents an opportunity to increase significantly the rate at which the volume of data can be turned into useful information. The purpose of the prediction algorithms is to forecast future values based on present records, in order to estimate the possibility of a machine break-down and therefore to support maintenance teams in planning appropriate maintenance interventions. It is observed that the proposed data mining approach provides promising results in predicting the exact value. | itsm | journal | 2019 | data-mining | |||
Rule-based Expert System for Paddy Information | Tun Thura Htet, Aye Aye Bo | Conference | 2013 | February | Artificial Intelligence | ITSM | Expert System, Artificial Intelligence, Knowledge Representation | Download | The rapid growth of technology has largely eased the access to information. At the same time increasingly difficult for people to collect, filter, evaluate and really use the vast amount of information. An information system has access to at least one and potentially many information sources. The organization cannot be operated or managed effectively without information system that are using a range of information technologies. In Pwintbyu Township, the production information paddy is stored in documents. In this paper, a computerized paddy information system is implemented by using knowledge representation technique. Knowledge Representation, more common expert systems currently developed, is best suited for applications in which the possible concern are limited in number. With the help of the implemented system, it is expected to retrieve the information of Pwintbyu Township and predict the results concerned with the agriculture of Pwintbyu Township. | itsm | conference | 2013 | artificial-intelligence | |||
Implementation of Inference in Rule-based system for studying the Nature of Birds | Hnin Yu Mon, Aye Aye Bo | Conference | 2010 | December | Artificial Intelligence | ITSM | Rule-based System, Birds | Download | A rule-based system expresses all of its knowledge in terms of explicit rules. Rule-based systems are typically used for applications, which required a lot of expert knowledge, a high degree of explain ability and a low level of creativity. Most rules are expressed in terms of IF X THEN Y. Knowledge is the key for rule-based systems. Rule-based system emphasizes on the inferencing with rules. Rule-based systems have the flexibility to be used in a top down or bottom up method. Top down is also known as forward chaining, and bottom up is synonymous with backward chaining. A rule-based system typically consists of rule base, working memory, and rule interpreter. This paper presents details of birds by using forward chaining and backward chaining of rule-based system. It is intended to display the inferencing of rules and also describe how it can be used to demonstrate the information of bird. | itsm | conference | 2010 | artificial-intelligence | |||
Knowledge-based System forAntibiotics | Thet Htar San, Aye Aye Bo | Conference | 2010 | 16December | Artificial Intelligence | ITSM | Knowledge-based System,Antibioties | Download | Knowledge-based systems are systems based on the methods and techniques of artificial intelligence. Knowledge-based systems were designed primarily for the purpose of being able to apply knowledge automatically. Knowledge is the base of personal information, which is integrated in a fashion, which allows it to be used in further interpretation and analysis of data. The aim of this paper is to provide the user in order to diagnose the bacterial infections and know the knowledge of Antibiotics. This system makes decision for the diseases which the user suffers and represents knowledge about antibiotics for the user’s disease. This paper presents a knowledge-based system that makes inference of bacterial infections and gives consistent Antibiotics by using Knowledge Acquisition, Knowledge Representation and Knowledge Manipulation methods. Antibiotics is medicine or chemical that can destroy harmful bacteria in the body of limit their growth. Knowledge Acquisition involves the acquisition of user’s age and symptoms that the user suffers. The acquired age and symptoms are organized as a rule in the Knowledge-based system for representation of knowledge. In Knowledge Manipulation, this system matches the rule with the rules in Knowledge-based system. If matches the rule with the rules in Knowledge-based system. If matching, the system makes inference of bacterial infection disease name and provides knowledge of Antibiotics to the user for treatment. | itsm | conference | 2010 | artificial-intelligence | |||
Computer Problem- Solving ByApplying Depth-First Search | Thet Htar San, Aye Aye Bo | Conference | 2009 | December | Artificial Intelligence | ITSM | Expert System, Artificial Intelligence, Problem Solving Strategies | Download | Artificial Intelligence (AI) is the science and engineering of making intelligent machines, especially intelligent computer programs and AI is related to the similar task of using computers to understand human intelligence. One of the applications of artificial intelligence is in expert system (ES) or knowledge-based. An expert system provides advice derived from its knowledge base. This system intends to solve computer problem without any computer expert. Knowledge base is made with many inferences rules and they are entered as separate rules that use them together to draw conclusions. This system intended to solve problems for Window XP based Operating System Computer by applying depth-first search algorithm. User can get the solution for their specific problems and they can make troubleshooting steps by themselves because the system will give the advice and step by step procedure for solution. | itsm | conference | 2009 | artificial-intelligence | |||
Comparison for the accuracy of defect fix effort estimation | Tin Zar Thaw, Myintzu Phyo Aung, Naw Lay Wah, Swe Swe Nyein, Zar Lwin Phyo, Khaing Zarchi Htun | Online Publication | 2010 | April | Software Engineering | FCS | Defects Estimation, SOM, Neural Network, Matlab7.0 | Download | Software defects have become the dominant cause of customer outage and the study of software errors has been necessitated by the emphasis on software reliability. Yet, software defects are not well enough understood to provide a clear methodology for avoiding or recovering from them. So software defect fix efforts play the critical role in software quality assurance. In this paper, the comparison of the defect fix effort estimation by using Self Organizing Map in neural network is presented. To estimate the defect fix effort, KC3 static defect attributes that is one of the publicly available data from NASA products is used in this paper. To implement the SOM, finding different clusters from the SOM and for the calculation of fix effort time of defect SOM Toolbox in MATLAB 7.0.1 is used. | fcs | online-publication | 2010 | software-engineering |