Message

Welcome to the official site of IIE. Our goal is to to bring together Researchers, Scientists, Engineers, Scholars and Students in the areas of Engineering & Technology, and provides a forum for dissemination of results, new ideas, Research & development and practical experiments, which concentrate on both theory and practices, for the benefit of common man.
IIE-Chair
Read More

March 29-30, 2014 Singapore Back


ISBN No. 978-93-82242-85-7

http://dx.doi.org/10.15242/IIE.E0314

 

Sr.No.Paper Title & Author(s)Page No.
1Human Behaviour Modelling for Games using Agents
Susantha Andradi, Asoka Karunananda, and Romesh Ranawana
1
2Bridging the Global Gap Between Academia and Industry- An Experimental Study in IT Development
Kun Shao
7
3Anatomical analysis of brain MRI in Alzheimer’s disease
Ali Farzan, Syamsiah Mashohor, Abd Rahman Ramli, and Rozi Mahmud
10
4Hierarchical Intrusion Patterns Recognition in Computer Networks
Ali Farzan, Shahin AkbarPour, and Mohammad Alizadeh
16
5An Overview of Applying Web Log File for Usage Access Pattern Using Weight Values
Nu Yin Kyaw
20
6Framework for Evaluating Reusability of PHP
Cho Thet Mon, and Khin Mar Myo
25
7Context Aware Cross-domain based Recommendation
Hla Hla Moe, and Win Thanda Aung
30
8Energy Efficient, Fault Tolerant Routing LEACH (EF-LEACH) Protocol for Wireless Sensor Networks
Hla Yin Min, and Win Zaw
36
9Simulation and Analysis of Multi-Party Contract Signing Protocol
Yadana Htun, and Win Zaw
41
10Formal Analysis of Secure E-cash Transaction Protocol
Aye Thandar Swe, and Khin Khat Khat Kyaw
45
11Computing Semantic Relatedness using Wikipedia Taxonomy by Spreading Activation
May Sabae Han, and Ei Ei Mon
49
12Regular Expression for Bangla-2-Braille Machine Translator
Syed Akhter Hossain, Lora Annanya Biswas, and Md Iqbal Hossain
54
13An Effective Iris Recognition System
Ei Phyu Win, and Nyein Aye
58
14A Text-based Web Document Clustering System By Using Improved Cuckoo Search Clustering System Based On Levy Flight
Moe Moe Zaw, and Ei Ei mon
63
15Combination of Authentication and Prevention of Flooding Attack in Clustering Hierarchical Wireless Sensor Network
Tin Win Maw, and Myo Hein Zaw
68
16Efficient Filtering Algorithm for Scalable XML-Based Publish/Subscribe Mobile System
Yi Yi Myint, and Hninn Aye Thant
75
17Robust Interactive Image Segmentation Integration of Color and Texture Features
May Thu Win
80
18Video Based Lane Departure Warning System using Hough Transform
Thanda Aung, and Myo Hein Zaw
85
19Simple and Faster Consensus Approach in Fault Tolerance
Yu Sanda Win, and Ei Ei Hlaing
89
20Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation
Witt Yi Win, and Hnin Hnin Htun
95
21Automatic Image Segmentation Using Edge and Marker-Controlled Watershed Transformation
Khin Lay Mon
100
22Mitigating Scheme for Black Hole Attack in AODV Routing Protocol
Ei Ei Khin, and Thandar Phyu
105
23Energy Aware Data-Centric Routing in Wireless Sensor Network
May Mon Khaing, and Tun Min Naing
110
24An Efficient Contactless Personal Identification System Using Biometric Pattern Recognition
Khaing Thanda Swe, and Myo Hein Zaw
115
25Human Identification Using Biometric Gait Features
Nyo Nyo Htwe, and Nu War
121
26Relevant Words Extraction Method for Web Recommender System
Naw Naw, and Ei Ei Hlaing
129
27MIPS Group Based Job Scheduling Model for Deploying Applications
Thu Zar Mon, and Cho Me Me Mg
135
28A Secure Fair E-cash Payment Protocol
Thae Nu Nge, and Aye Su Hlaing
140
29Implementation of Cryptography and Image Steganography with New Security Feature
Pye Pye Aung, and Tun Min Naing
144
30Formal Analysis of Two Party Signature Exchange Protocol
Pearl Ei Phyu, and Khin Khat Khat Kyaw
149
31Summarization and Reduction Model of Intrusion Alert
Mon Mon Zaw, and Thandar Phyu
153
32An Adaptive Congestion Avoidance ACA_AODV Routing Protocol
Paing Thwe Soe, and Soe Soe Khaing
157
33Quantifying and Validation of Changeability and Extensibility for Aspect-Oriented Software
Khine Zar Ne Winn
162
34Efficient Dynamic Blocking Scheme for Entity Resolution Systems
Aye Chan Mon, and Mie Mie Su Thwin
167
35A Fair Certified Email Protocol with Message Confidentiality
Kyikyi Maw, and Eiei Khin
172
36Concurrency Control Mechanism using Two-Shadow Speculative Concurrency Control with Rules for Closed Nested Transactions Model in Mobile Environment
Ms. Nyo Nyo Yee, and Ms. Hninn Aye Thant
176
37Web Services Based Information Searching Multi-Agent System for Health Care Services
Yu Mon Zaw, and Nay Min Tun
182
38Enhancement of Region Merging Algorithm for Image Segmentation
Tin Tin Htar, and Soe Lin Aung
187
39Ontology Based Hotel Information Extraction from Unstructured Text
Amy Aung, and May Phyo Thwal
192
40Using Markov Model and Popularity and Similarity-based Page Rank Algorithm for Web Page Access Prediction
Phyu Thwe
197
41Application of Classical/Variable Structure/Fuzzy Controllers for AGC Under Deregulated Environment
K.Chandra Sekhar, and K.Vaisakh
202
42RSA Variant with Efficient Memory Usage
Seema Verma, and Deepak Garg
209
43The Proxy-based Web Service Adaptation System for Mobile Clients
Shwe Thinzar Aung, and Aung Win
212
44Security Improvement on an Anonymous Fair Exchange E-commerce Protocol
Nay Chi Htun, and Khin Khat Khat Kyaw
217
45Permission Based Malware Protection Model for Android Application
Chit La Pyae Myo Hein
222
46Multiple Linear Regression Approach for Determining Quality of Web Service in Mobile Environment
Khaing Lae Lae Soe, and Thiri Haymar Kyaw
227
47Ranking Hyperlinks Approach for Focused Web Crawler
Nandar Win Min, and Aye Nandar Hlaing
231
48Development of Myanmar Cars Stop Line Violation Detection System using Projection Analysis
Waing, and Dr. Nyein Aye
236
49Enhanced AODV for Providing QoS of Multimedia Application in MANET
Wintwar Oo, and Eiei Khin
242
50Ranking and Filtering the Selected Attributes for Intrusion Detection System
Phyu Thi Htun, and Kyaw Thet Khaing
249
51Authorship Attribution of Online Messages using Stylometry: An Exploratory Study
Smita Nirkhi, Dr.R.V. Dharaskar, and Dr.V.M. Thakare
254
52An Approach to Enhance in Group Signature Scheme with Anonymous Revocation
Thu Thu Mon Oo, and Win Htay
258
53Inference Rules Generation Algorithm for Ontology Mapping
Zin Thu Thu Myint, and Kay Khaing Win
263
54CGANN-Clustered Genetic Algorithm with Neural Network for Software Cost Estimation
Pushpendra K Rajput, Geeta Sikka, and Aarti
268
55A Modified High Capacity Colored Image Steganography in RGB Color Space
Moh Moh Zan, and Nyein Aye
273
56Intelligent Information Retrieval using Query Classification Algorithm
Myomyo Thannaing, and Ayenandar Hlaing
278
57Topic-based Resource Recommendation
Zarli Htun, and Phyu Phyu Tar
283
58Identification of Community Cores in Multi-Relational Network
Zin Mar Yin, and Soe Soe Khaing
288
59Applying Improved Recommendation Techniques for Recommending Learning Resources in Web
Khin Nila Win, and Thiri Hay Mar Kyaw
293
60Cloud Forensic Investigation using Digital Provenance Scheme
Nay Aung Aung, and Myat Myat Min
297
61Offline Signature Verification System using Neural Network
Htight Htight Wai, and Soe Lin Aung
302
62Efficient Secure Provenance Scheme for Strong Integrity
Myat Mon Aye, and Than Naing Soe
307
63New Hybrid Signcryption Scheme with Digital Envelope
The Seint Aye, and Than Naing Soe
311
64Analysis of DDoS Detection System based on Anomaly Detection System
Thwe Thwe Oo, and Thandar Phyu
315
65A New Scheme of Neural Network and DCT-Domain Based Digital Watermarking
Mya Thidar Kyaw, and Kyi Soe
320
66Modified Energy Constraint AODV for Wireless Sensor Network
Hnin Yu Swe, and Soe Soe Khaing
326
67Energy Efficient Multipath Routing Protocol for Wireless Mobile Ad Hoc Networks
May Cho Aye, and Aye Moe Aung
330
68Audio Indexing System based Myanmar Ethnic Music Signals using Simple Search Algorithm
May Thu Myint
335
69Performance Analysis of Slide Mode Control based MPPT Controller for Photovoltaic Applications
Saravana Selvan.D, Harikrishnan.V, Umayal.V, and Indumathy.M
339
70Detection and Classification of Attacks in Unauthorized Accesses
Mya Thidar Myo Win, and Kyaw Thet Khaing
345
71Review Spammer Detection by using Behaviors Based Scoring Methods
Chan Myae Aye, and Kyaw May Oo
350
72Analysis of Text Information Extraction and Card Identification in Video Clips
Khin Thandar Tint, and Kyi Soe
356
73Modification of Propagation Prediction Model for 2.4 GHz Indoor Wireless Environment
Phyo Thu Zar Tun, and Aye Su Hlaing
360
74Myanmar Dictionary Based Proactive Password Checker
La Wynn Sandi, and Nyein Aye
365
75Enforcing Scalability: An Efficient Approach for Distributed Database Partial Replication
Tin Myint Naing, and Aung Win
370
76QoS Provisioning in Channel Allocation Strategy in Cognitive Radio Using Fuzzy Logic
Harsh K Verma, Maninder Jeet Kaur, and Moin Uddin
375
77An Integrated Secured Network Management System of Mobile Communication Solution Using SSL- Encryption MMSE with GIS
Arockia Prince J, Madhan Kumar, and Vanitha L
383
78Myanmar Text Areas Identification from Video Scenes
Thuzar Tint, and Dr.Nyein Aye
389
79Segmentation of MRI Brain Data using Soft Computing Approach
Dr.P.N.Chatur, Ravi Mante, and Nivedita Mahore
395
80Multi-Document Summarizer for Earthquake News Written in Myanmar Language
Myat Myitzu Kyaw, and Nyein Nyein Myo
401
81GIS Data Compression Based On Block- Encoding and Quadtree Approach
Phyo Phyo Wai, and Nyein Aye
406
82Identifying and Reviewing the Most Relevant Socio-technical Aspects of Requirements-Driven Collaboration in Agile Teams
Irum Inayat, Siti Salwah Salim, Sabrina Marczak, and Zarinah Mohammad Kasirun
410
83An Experimental Study of Heads Degradation in Magnetic Recording with Load/Unload
Nuttapat Weerathanakiat, and Pitikhate Sooraksa
416
84Discourse on Data Mining Applications to Design Renewable Energy Systems
Atika Qazi, H. Fayaz, and Ram Gopal Raj
418
85Election System Based Fingerprint Scanner as Substitute for Paper-based Election in Indonesia
Khusnul Ari Mustaqim, Isna Armawati, and Reza Dwi Utomo
421
86Tree Redundancy by Induction Mining
Rajalakshmi Selvaraj, and Venu Madhav Kuthadi
425
87Evaluation of Radial and Hierarchical Opinion Visualization Techniques
Azra Shamim, Vimala Balakrishnan, and Muhammad Tahir
429
88Assessment of IPv6 Readiness and Adoption Strategy for Mauritius
Aatish Chiniah
434
89Deterioration of Crashworthiness Performance of Aged Structure
I. Abdul Hamid, and Q.M. Li
439
90The Emergency Runway
S.V.S.PHANI HARSHA
444
91A New Methodology to Extract Machining Features From Prismatic Parts
Sreeramulu Dowluru, Suman P, and Satish Kumar Adapa
447
92The Model Wind and Solar Power Installation Based on High-Temperature Superconductors
Lidia I. Chubraeva, Vladislav F. Shyshlakov, Dmitrii A. Volkov, Sergey S. Tymofeyev, Mikhail A. Turubanov, and Andrey V. Shyshlakov
453
93Design Optimization of SGCI Insert Embedded in Pre Stressed Concrete Sleeper
Srihari Palli, and Azad Duppala
457
94Active Space Debris Removal by Using Coil Gun Mechanism
Logesh Sadasivam, Akshai Sriram, and R.V.Subendran
464
95Patient’s Waiting Time Reduction in Outpatient Department
Natchaya Lailomthong, and Seeronk Prichanont
468
96Comparative study on Mechanical Strength of Macroporous Hydroxyapatite-Biopolymer Based Composite Scaffold
Sudip Dasgupta, and Kanchan Maji
474
97Approximate Analytic Solution for Constant Accelerated Flow of Third Grade Fluid in a Rotating Frame
Mojtaba Nazari, Vincent Daniel David, and Zainal Abdul Aziz
481
98Thermodynamics of Biosorption of Zn and Cu in Aqueous Solution by Rhodopseudomonas boonkerdii sp. strain NS20 and Bradyrhizobium sp. strain DOA9
Apichart Panitchagul, Rujirek Noisangiam, Panlada Tittabutr, Neung Teaumroong, and Usanee Kitkamthorn
485
99Effect of Zircon Sand Volume Fractions on the Mechanical Behaviors of 2124 Aluminum Alloy reinforced Metal Matrix Composites
M. M. Emara, and A. Refaat
490
100Josephson Supercurrent in a Composite Topological Superconductor/S-Wave Superconductor Junction
Chong-dan Ren
496
101The Role of Some Special Generators to Generalize Some of the Basic Linear Problem to the Corresponding Pseudo-Linear Problem
Dhurata Valera
497
102Numerical Investigation of Free Convection Heat Transfer in a Vertical Enclosure
Adel Alshayji, and Haya Alsaeed
503
103Face Recognition Using Eigenface and Discrete Wavelet Transform
Muzammil Abdulrahman, Yusuf G. Dambatta, Abubakar Sani Muhammad, and Abubakar Saddiq Muhammad
510
104Solar Energy as the future
Mallavarapu Nirmal Kumar
514
105Patient Care System through Easily Configurable Wi-Fi Enabled ADCs
Sri Vignesh I
520
106Peak to Average Power Ratio reduction in DD-Optical OFDM systems by Subcarrier Exclusion and Optimal Subcarrier Pairing
K.Ganesh Kumar, M.Palanivelan, Dr.Sheila Anand, and T.Ilavarasan
522
107Reset Signal aware Hardware Trojan trigger
Masaya Yoshikawa, Daiki Takeuchir, and Takeshi Kumaki
528
108Characterization Study for Polymer Core Solder Balls under MSL Level Stress Test for BGA Semiconductor
Boon Kar Yap, Cai Hui Tan, and Chou Yong Tan
532
109A Hybrid Multi Level Three Phase Inverter
Dr. V Siva Krishna Rao Gadi, N.CH.V. Chakravarthi Bobbili, Seshagiri Boppana, and Dr. Suresh Kumar Tummala
536
110Distributed Fault Detection and Isolation in Formation Flight of Satellites using Extended Kalman Filters
S. Ghasemi, and K. Khorasani
541
111Effect of Leakage Inductance on Torque Capability of Field Oriented Controlled Induction Machine in Field Weakening Region
Nisha G.K., Lakaparampil Z.V., and Ushakumari S.
549
112DVR with Artifcial Intelligent Controller for Voltage Sag Mitigation
Mohamed Mohamed Khaleel, Khaled Abduesslam, Prof. Muhammad Nizam, and Dr. Inayati, ST, MT, ph.D
557
113Ant Colony Optimization for Reducing the Consistency Ratio in Comparison Matrix
Abba Suganda Girsang, Chun-Wei Tsai, and Chu-Sing Yang
565
114Dry Sliding Wear Characteristics of AISI440C Martensitic Stainless Steel
Dararat Arparjirasakul, Tapany Patcharawit, and Usanee Kitkamthorn
571
115Analysis of Dynamic Characteristics of Switched Reluctance Generator
N.B.Kavitha, and B.Vinu Priya
576
116A Proposed Framework for Risk-Based Integrity Management System (BIMs) of Highway Bridge in Malaysia
Wan Safizah Wan Salim, M. S. Liew, and A’fza Shafie
581
117Experimental Approach to Investigate the Behaviour of Brick Masonry for Different Mortar Ratios
Thanikasalapradeep Nagarajan, Selvakumar Viswanathan, Sinthiya Ravi, V.Srinivas, and Premavathi Narayanan
586
118Starch Based Bioplastics Reinforced with Cellulose Nanocrystals from Agricultural Residues
Melissa B. Agustin, Enna Richel P. De Leon, Jerico L. Buenaobra, Shanna Marie M. Alonzo, Famille M. Patriana, Fumihiko Hirose, and Bashir Ahmmad
593
119Electrochemical Properties of Hexagonal P2-Structure NaLi0.2Mn0.8O2 as a Cathode Material for Na-ion Batteries
Nguyen Van Nghia, Ripon Bhattacharjee, and I-Ming Hung
598
120Effect of Operating Parameters and Kinetic Study on Photocatalytic Degradation of o-Cresol in Synthetic Wastewater with Irradiated Titanium Dioxide
Anh-Thu Nguyen, and Ruey-Shin Juang
602
121Colonization Of Mars
Dakoju Nikhil
607
122Life Cycle Assessment of Biofuel from Microemulsion and Transesterification Processes
Pichita Ekkpowpan, Noulkamol Arpornpong, Ampira Charoensaeng, and Sutha Khaodhiar
610
123Environmental Life Cycle Assessment of Palm oil- based Biofuel Production from Transesterification: Greenhouse gas, Energy and Water Balances
Virin Kittithammavong, Noulkamol Arpornpong, Ampira Charoensaeng, and Sutha Khaodhiar
615
124Modeling Erosion from Erosion Features on Gravel Roads: The Rill Model
Twaibu Semwogerere, Samuel Baker Kucel, and Peter Okidi Lating
622
125Effect of Sodium Hypochlorite on Fouled Ceramic Membrane Reclamation and Flux Recovery
Prattakorn Sittisom, and Suraphong Wattanachira
627

Conference Gallery

Indexing / Supported by