Sr.No. | Paper Title & Author(s) | Page No. |
1 | Human Behaviour Modelling for Games using Agents Susantha Andradi, Asoka Karunananda, and Romesh Ranawana | 1 |
2 | Bridging the Global Gap Between Academia and Industry- An Experimental Study in IT Development Kun Shao | 7 |
3 | Anatomical analysis of brain MRI in Alzheimer’s disease Ali Farzan, Syamsiah Mashohor, Abd Rahman Ramli, and Rozi Mahmud | 10 |
4 | Hierarchical Intrusion Patterns Recognition in Computer Networks Ali Farzan, Shahin AkbarPour, and Mohammad Alizadeh | 16 |
5 | An Overview of Applying Web Log File for Usage Access Pattern Using Weight Values Nu Yin Kyaw | 20 |
6 | Framework for Evaluating Reusability of PHP Cho Thet Mon, and Khin Mar Myo | 25 |
7 | Context Aware Cross-domain based Recommendation Hla Hla Moe, and Win Thanda Aung | 30 |
8 | Energy Efficient, Fault Tolerant Routing LEACH (EF-LEACH) Protocol for Wireless Sensor Networks Hla Yin Min, and Win Zaw | 36 |
9 | Simulation and Analysis of Multi-Party Contract Signing Protocol Yadana Htun, and Win Zaw | 41 |
10 | Formal Analysis of Secure E-cash Transaction Protocol Aye Thandar Swe, and Khin Khat Khat Kyaw | 45 |
11 | Computing Semantic Relatedness using Wikipedia Taxonomy by Spreading Activation May Sabae Han, and Ei Ei Mon | 49 |
12 | Regular Expression for Bangla-2-Braille Machine Translator Syed Akhter Hossain, Lora Annanya Biswas, and Md Iqbal Hossain | 54 |
13 | An Effective Iris Recognition System Ei Phyu Win, and Nyein Aye | 58 |
14 | A Text-based Web Document Clustering System By Using Improved Cuckoo Search Clustering System Based On Levy Flight Moe Moe Zaw, and Ei Ei mon | 63 |
15 | Combination of Authentication and Prevention of Flooding Attack in Clustering Hierarchical Wireless Sensor Network Tin Win Maw, and Myo Hein Zaw | 68 |
16 | Efficient Filtering Algorithm for Scalable XML-Based Publish/Subscribe Mobile System Yi Yi Myint, and Hninn Aye Thant | 75 |
17 | Robust Interactive Image Segmentation Integration of Color and Texture Features May Thu Win | 80 |
18 | Video Based Lane Departure Warning System using Hough Transform Thanda Aung, and Myo Hein Zaw | 85 |
19 | Simple and Faster Consensus Approach in Fault Tolerance Yu Sanda Win, and Ei Ei Hlaing | 89 |
20 | Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation Witt Yi Win, and Hnin Hnin Htun | 95 |
21 | Automatic Image Segmentation Using Edge and Marker-Controlled Watershed Transformation Khin Lay Mon | 100 |
22 | Mitigating Scheme for Black Hole Attack in AODV Routing Protocol Ei Ei Khin, and Thandar Phyu | 105 |
23 | Energy Aware Data-Centric Routing in Wireless Sensor Network May Mon Khaing, and Tun Min Naing | 110 |
24 | An Efficient Contactless Personal Identification System Using Biometric Pattern Recognition Khaing Thanda Swe, and Myo Hein Zaw | 115 |
25 | Human Identification Using Biometric Gait Features Nyo Nyo Htwe, and Nu War | 121 |
26 | Relevant Words Extraction Method for Web Recommender System Naw Naw, and Ei Ei Hlaing | 129 |
27 | MIPS Group Based Job Scheduling Model for Deploying Applications Thu Zar Mon, and Cho Me Me Mg | 135 |
28 | A Secure Fair E-cash Payment Protocol Thae Nu Nge, and Aye Su Hlaing | 140 |
29 | Implementation of Cryptography and Image Steganography with New Security Feature Pye Pye Aung, and Tun Min Naing | 144 |
30 | Formal Analysis of Two Party Signature Exchange Protocol Pearl Ei Phyu, and Khin Khat Khat Kyaw | 149 |
31 | Summarization and Reduction Model of Intrusion Alert Mon Mon Zaw, and Thandar Phyu | 153 |
32 | An Adaptive Congestion Avoidance ACA_AODV Routing Protocol Paing Thwe Soe, and Soe Soe Khaing | 157 |
33 | Quantifying and Validation of Changeability and Extensibility for Aspect-Oriented Software Khine Zar Ne Winn | 162 |
34 | Efficient Dynamic Blocking Scheme for Entity Resolution Systems Aye Chan Mon, and Mie Mie Su Thwin | 167 |
35 | A Fair Certified Email Protocol with Message Confidentiality Kyikyi Maw, and Eiei Khin | 172 |
36 | Concurrency Control Mechanism using Two-Shadow Speculative Concurrency Control with Rules for Closed Nested Transactions Model in Mobile Environment Ms. Nyo Nyo Yee, and Ms. Hninn Aye Thant | 176 |
37 | Web Services Based Information Searching Multi-Agent System for Health Care Services Yu Mon Zaw, and Nay Min Tun | 182 |
38 | Enhancement of Region Merging Algorithm for Image Segmentation Tin Tin Htar, and Soe Lin Aung | 187 |
39 | Ontology Based Hotel Information Extraction from Unstructured Text Amy Aung, and May Phyo Thwal | 192 |
40 | Using Markov Model and Popularity and Similarity-based Page Rank Algorithm for Web Page Access Prediction Phyu Thwe | 197 |
41 | Application of Classical/Variable Structure/Fuzzy Controllers for AGC Under Deregulated Environment K.Chandra Sekhar, and K.Vaisakh | 202 |
42 | RSA Variant with Efficient Memory Usage Seema Verma, and Deepak Garg | 209 |
43 | The Proxy-based Web Service Adaptation System for Mobile Clients Shwe Thinzar Aung, and Aung Win | 212 |
44 | Security Improvement on an Anonymous Fair Exchange E-commerce Protocol Nay Chi Htun, and Khin Khat Khat Kyaw | 217 |
45 | Permission Based Malware Protection Model for Android Application Chit La Pyae Myo Hein | 222 |
46 | Multiple Linear Regression Approach for Determining Quality of Web Service in Mobile Environment Khaing Lae Lae Soe, and Thiri Haymar Kyaw | 227 |
47 | Ranking Hyperlinks Approach for Focused Web Crawler Nandar Win Min, and Aye Nandar Hlaing | 231 |
48 | Development of Myanmar Cars Stop Line Violation Detection System using Projection Analysis Waing, and Dr. Nyein Aye | 236 |
49 | Enhanced AODV for Providing QoS of Multimedia Application in MANET Wintwar Oo, and Eiei Khin | 242 |
50 | Ranking and Filtering the Selected Attributes for Intrusion Detection System Phyu Thi Htun, and Kyaw Thet Khaing | 249 |
51 | Authorship Attribution of Online Messages using Stylometry: An Exploratory Study Smita Nirkhi, Dr.R.V. Dharaskar, and Dr.V.M. Thakare | 254 |
52 | An Approach to Enhance in Group Signature Scheme with Anonymous Revocation Thu Thu Mon Oo, and Win Htay | 258 |
53 | Inference Rules Generation Algorithm for Ontology Mapping Zin Thu Thu Myint, and Kay Khaing Win | 263 |
54 | CGANN-Clustered Genetic Algorithm with Neural Network for Software Cost Estimation Pushpendra K Rajput, Geeta Sikka, and Aarti | 268 |
55 | A Modified High Capacity Colored Image Steganography in RGB Color Space Moh Moh Zan, and Nyein Aye | 273 |
56 | Intelligent Information Retrieval using Query Classification Algorithm Myomyo Thannaing, and Ayenandar Hlaing | 278 |
57 | Topic-based Resource Recommendation Zarli Htun, and Phyu Phyu Tar | 283 |
58 | Identification of Community Cores in Multi-Relational Network Zin Mar Yin, and Soe Soe Khaing | 288 |
59 | Applying Improved Recommendation Techniques for Recommending Learning Resources in Web Khin Nila Win, and Thiri Hay Mar Kyaw | 293 |
60 | Cloud Forensic Investigation using Digital Provenance Scheme Nay Aung Aung, and Myat Myat Min | 297 |
61 | Offline Signature Verification System using Neural Network Htight Htight Wai, and Soe Lin Aung | 302 |
62 | Efficient Secure Provenance Scheme for Strong Integrity Myat Mon Aye, and Than Naing Soe | 307 |
63 | New Hybrid Signcryption Scheme with Digital Envelope The Seint Aye, and Than Naing Soe | 311 |
64 | Analysis of DDoS Detection System based on Anomaly Detection System Thwe Thwe Oo, and Thandar Phyu | 315 |
65 | A New Scheme of Neural Network and DCT-Domain Based Digital Watermarking Mya Thidar Kyaw, and Kyi Soe | 320 |
66 | Modified Energy Constraint AODV for Wireless Sensor Network Hnin Yu Swe, and Soe Soe Khaing | 326 |
67 | Energy Efficient Multipath Routing Protocol for Wireless Mobile Ad Hoc Networks May Cho Aye, and Aye Moe Aung | 330 |
68 | Audio Indexing System based Myanmar Ethnic Music Signals using Simple Search Algorithm May Thu Myint | 335 |
69 | Performance Analysis of Slide Mode Control based MPPT Controller for Photovoltaic Applications Saravana Selvan.D, Harikrishnan.V, Umayal.V, and Indumathy.M | 339 |
70 | Detection and Classification of Attacks in Unauthorized Accesses Mya Thidar Myo Win, and Kyaw Thet Khaing | 345 |
71 | Review Spammer Detection by using Behaviors Based Scoring Methods Chan Myae Aye, and Kyaw May Oo | 350 |
72 | Analysis of Text Information Extraction and Card Identification in Video Clips Khin Thandar Tint, and Kyi Soe | 356 |
73 | Modification of Propagation Prediction Model for 2.4 GHz Indoor Wireless Environment Phyo Thu Zar Tun, and Aye Su Hlaing | 360 |
74 | Myanmar Dictionary Based Proactive Password Checker La Wynn Sandi, and Nyein Aye | 365 |
75 | Enforcing Scalability: An Efficient Approach for Distributed Database Partial Replication Tin Myint Naing, and Aung Win | 370 |
76 | QoS Provisioning in Channel Allocation Strategy in Cognitive Radio Using Fuzzy Logic Harsh K Verma, Maninder Jeet Kaur, and Moin Uddin | 375 |
77 | An Integrated Secured Network Management System of Mobile Communication Solution Using SSL- Encryption MMSE with GIS Arockia Prince J, Madhan Kumar, and Vanitha L | 383 |
78 | Myanmar Text Areas Identification from Video Scenes Thuzar Tint, and Dr.Nyein Aye | 389 |
79 | Segmentation of MRI Brain Data using Soft Computing Approach Dr.P.N.Chatur, Ravi Mante, and Nivedita Mahore | 395 |
80 | Multi-Document Summarizer for Earthquake News Written in Myanmar Language Myat Myitzu Kyaw, and Nyein Nyein Myo | 401 |
81 | GIS Data Compression Based On Block- Encoding and Quadtree Approach Phyo Phyo Wai, and Nyein Aye | 406 |
82 | Identifying and Reviewing the Most Relevant Socio-technical Aspects of Requirements-Driven Collaboration in Agile Teams Irum Inayat, Siti Salwah Salim, Sabrina Marczak, and Zarinah Mohammad Kasirun | 410 |
83 | An Experimental Study of Heads Degradation in Magnetic Recording with Load/Unload Nuttapat Weerathanakiat, and Pitikhate Sooraksa | 416 |
84 | Discourse on Data Mining Applications to Design Renewable Energy Systems Atika Qazi, H. Fayaz, and Ram Gopal Raj | 418 |
85 | Election System Based Fingerprint Scanner as Substitute for Paper-based Election in Indonesia Khusnul Ari Mustaqim, Isna Armawati, and Reza Dwi Utomo | 421 |
86 | Tree Redundancy by Induction Mining Rajalakshmi Selvaraj, and Venu Madhav Kuthadi | 425 |
87 | Evaluation of Radial and Hierarchical Opinion Visualization Techniques Azra Shamim, Vimala Balakrishnan, and Muhammad Tahir | 429 |
88 | Assessment of IPv6 Readiness and Adoption Strategy for Mauritius Aatish Chiniah | 434 |
89 | Deterioration of Crashworthiness Performance of Aged Structure I. Abdul Hamid, and Q.M. Li | 439 |
90 | The Emergency Runway S.V.S.PHANI HARSHA | 444 |
91 | A New Methodology to Extract Machining Features From Prismatic Parts Sreeramulu Dowluru, Suman P, and Satish Kumar Adapa | 447 |
92 | The Model Wind and Solar Power Installation Based on High-Temperature Superconductors Lidia I. Chubraeva, Vladislav F. Shyshlakov, Dmitrii A. Volkov, Sergey S. Tymofeyev, Mikhail A. Turubanov, and Andrey V. Shyshlakov | 453 |
93 | Design Optimization of SGCI Insert Embedded in Pre Stressed Concrete Sleeper Srihari Palli, and Azad Duppala | 457 |
94 | Active Space Debris Removal by Using Coil Gun Mechanism Logesh Sadasivam, Akshai Sriram, and R.V.Subendran | 464 |
95 | Patient’s Waiting Time Reduction in Outpatient Department Natchaya Lailomthong, and Seeronk Prichanont | 468 |
96 | Comparative study on Mechanical Strength of Macroporous Hydroxyapatite-Biopolymer Based Composite Scaffold Sudip Dasgupta, and Kanchan Maji | 474 |
97 | Approximate Analytic Solution for Constant Accelerated Flow of Third Grade Fluid in a Rotating Frame Mojtaba Nazari, Vincent Daniel David, and Zainal Abdul Aziz | 481 |
98 | Thermodynamics of Biosorption of Zn and Cu in Aqueous Solution by Rhodopseudomonas boonkerdii sp. strain NS20 and Bradyrhizobium sp. strain DOA9 Apichart Panitchagul, Rujirek Noisangiam, Panlada Tittabutr, Neung Teaumroong, and Usanee Kitkamthorn | 485 |
99 | Effect of Zircon Sand Volume Fractions on the Mechanical Behaviors of 2124 Aluminum Alloy reinforced Metal Matrix Composites M. M. Emara, and A. Refaat | 490 |
100 | Josephson Supercurrent in a Composite Topological Superconductor/S-Wave Superconductor Junction Chong-dan Ren | 496 |
101 | The Role of Some Special Generators to Generalize Some of the Basic Linear Problem to the Corresponding Pseudo-Linear Problem Dhurata Valera | 497 |
102 | Numerical Investigation of Free Convection Heat Transfer in a Vertical Enclosure Adel Alshayji, and Haya Alsaeed | 503 |
103 | Face Recognition Using Eigenface and Discrete Wavelet Transform Muzammil Abdulrahman, Yusuf G. Dambatta, Abubakar Sani Muhammad, and Abubakar Saddiq Muhammad | 510 |
104 | Solar Energy as the future Mallavarapu Nirmal Kumar | 514 |
105 | Patient Care System through Easily Configurable Wi-Fi Enabled ADCs Sri Vignesh I | 520 |
106 | Peak to Average Power Ratio reduction in DD-Optical OFDM systems by Subcarrier Exclusion and Optimal Subcarrier Pairing K.Ganesh Kumar, M.Palanivelan, Dr.Sheila Anand, and T.Ilavarasan | 522 |
107 | Reset Signal aware Hardware Trojan trigger Masaya Yoshikawa, Daiki Takeuchir, and Takeshi Kumaki | 528 |
108 | Characterization Study for Polymer Core Solder Balls under MSL Level Stress Test for BGA Semiconductor Boon Kar Yap, Cai Hui Tan, and Chou Yong Tan | 532 |
109 | A Hybrid Multi Level Three Phase Inverter Dr. V Siva Krishna Rao Gadi, N.CH.V. Chakravarthi Bobbili, Seshagiri Boppana, and Dr. Suresh Kumar Tummala | 536 |
110 | Distributed Fault Detection and Isolation in Formation Flight of Satellites using Extended Kalman Filters S. Ghasemi, and K. Khorasani | 541 |
111 | Effect of Leakage Inductance on Torque Capability of Field Oriented Controlled Induction Machine in Field Weakening Region Nisha G.K., Lakaparampil Z.V., and Ushakumari S. | 549 |
112 | DVR with Artifcial Intelligent Controller for Voltage Sag Mitigation Mohamed Mohamed Khaleel, Khaled Abduesslam, Prof. Muhammad Nizam, and Dr. Inayati, ST, MT, ph.D | 557 |
113 | Ant Colony Optimization for Reducing the Consistency Ratio in Comparison Matrix Abba Suganda Girsang, Chun-Wei Tsai, and Chu-Sing Yang | 565 |
114 | Dry Sliding Wear Characteristics of AISI440C Martensitic Stainless Steel Dararat Arparjirasakul, Tapany Patcharawit, and Usanee Kitkamthorn | 571 |
115 | Analysis of Dynamic Characteristics of Switched Reluctance Generator N.B.Kavitha, and B.Vinu Priya | 576 |
116 | A Proposed Framework for Risk-Based Integrity Management System (BIMs) of Highway Bridge in Malaysia Wan Safizah Wan Salim, M. S. Liew, and A’fza Shafie | 581 |
117 | Experimental Approach to Investigate the Behaviour of Brick Masonry for Different Mortar Ratios Thanikasalapradeep Nagarajan, Selvakumar Viswanathan, Sinthiya Ravi, V.Srinivas, and Premavathi Narayanan | 586 |
118 | Starch Based Bioplastics Reinforced with Cellulose Nanocrystals from Agricultural Residues Melissa B. Agustin, Enna Richel P. De Leon, Jerico L. Buenaobra, Shanna Marie M. Alonzo, Famille M. Patriana, Fumihiko Hirose, and Bashir Ahmmad | 593 |
119 | Electrochemical Properties of Hexagonal P2-Structure NaLi0.2Mn0.8O2 as a Cathode Material for Na-ion Batteries Nguyen Van Nghia, Ripon Bhattacharjee, and I-Ming Hung | 598 |
120 | Effect of Operating Parameters and Kinetic Study on Photocatalytic Degradation of o-Cresol in Synthetic Wastewater with Irradiated Titanium Dioxide Anh-Thu Nguyen, and Ruey-Shin Juang | 602 |
121 | Colonization Of Mars Dakoju Nikhil | 607 |
122 | Life Cycle Assessment of Biofuel from Microemulsion and Transesterification Processes Pichita Ekkpowpan, Noulkamol Arpornpong, Ampira Charoensaeng, and Sutha Khaodhiar | 610 |
123 | Environmental Life Cycle Assessment of Palm oil- based Biofuel Production from Transesterification: Greenhouse gas, Energy and Water Balances Virin Kittithammavong, Noulkamol Arpornpong, Ampira Charoensaeng, and Sutha Khaodhiar | 615 |
124 | Modeling Erosion from Erosion Features on Gravel Roads: The Rill Model Twaibu Semwogerere, Samuel Baker Kucel, and Peter Okidi Lating | 622 |
125 | Effect of Sodium Hypochlorite on Fouled Ceramic Membrane Reclamation and Flux Recovery Prattakorn Sittisom, and Suraphong Wattanachira | 627 |