13 results on '"Swe Zin Hlaing"'
Search Results
2. Verifying the Gaming Strategy of Self-learning Game by Using PRISM-Games.
- Author
-
Hein Htoo Zaw and Swe Zin Hlaing
- Published
- 2019
- Full Text
- View/download PDF
3. A Policy Revocation Scheme for Attributes-based Encryption.
- Author
-
Phyo Wah Wah Myint, Swe Zin Hlaing, and Ei Chaw Htoon
- Published
- 2018
- Full Text
- View/download PDF
4. Automated Size Measurement of Embedded System based on XML using COSMIC FSM.
- Author
-
Thandar Zaw, Swe Zin Hlaing, Myint Myint Lwin, and Koichiro Ochimizu
- Published
- 2018
5. EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data
- Author
-
Phyo Wah Wah Myint, Ei Chaw Htoon, and Swe Zin Hlaing
- Subjects
Key generation ,Revocation ,Computer science ,business.industry ,Data security ,Cryptography ,Access control ,Cloud computing ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,Computer security ,computer.software_genre ,Ciphertext ,business ,computer - Abstract
Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy Attributes-Based Encryption (CP-ABE) is observed for the cloud environment. Because ciphertexts and secret keys are relying on attributes, the revocation issue becomes a challenge for CP-ABE. This paper proposes an encryption access control (EAC) scheme to fulfill policy revocation which covers both attribute and user revocation. When one of the attributes in an access policy is changed by the data owner, the authorized users should be updated immediately because the revoked users who have gained previous access policy can observe the ciphertext. Especially for data owners, four types of updating policy levels are predefined. By classifying those levels, each secret token key is distinctly generated for each level. Consequently, a new secret key is produced by hashing the secret token key. This paper analyzes the execution times of key generation, encryption, and decryption times between non-revocation and policy revocation cases. Performance analysis for policy revocation is also presented in this paper.
- Published
- 2020
- Full Text
- View/download PDF
6. Multi-Criteria Decision Analysis in Urban Transport System by applying Function Resonance Analysis Method
- Author
-
Myint Myint Lwin, Shin Mon Phyo, and Swe Zin Hlaing
- Subjects
geography ,Queueing theory ,Government ,geography.geographical_feature_category ,Computer science ,media_common.quotation_subject ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Control (management) ,Analytic hierarchy process ,Urban area ,Multiple-criteria decision analysis ,Transport engineering ,Traffic congestion ,ComputerSystemsOrganization_MISCELLANEOUS ,Function (engineering) ,media_common - Abstract
Traffic congestion is one of the major problems facing Yangon and is attributed to many factors including rapid population increase, poor road infrastructure, city structure, the rapid increase in the number of cars, and a lack of physical car parking plan. For this congestion problem, people can be lost their valuable time and cost. To avoid traffic congestion problems, the best choice of the urban transport system with multiple criteria such as Car Capacity (CC), Required Time (Time), Car Parking Place (PP), Required Cost (Cost), and Travelling Cost (Cost) are introduced in the proposed approach. Before applying the multicriteria analysis method, this paper analyzes the traffic congestion problem by using the Functional Resonance Analysis Method (FRAM). In this analysis, data collected from the Yangon Traffic Control Center (TCC) and show the traffic congestion status using Queuing Model. Based on the traffic congestion status, AHP is applied by identifying suitable alternative solutions of the urban transport system such as rail transport system, public bus system, taxi system, and private car system for the dedicated urban area in Yangon. As a result, the government can consider the urban transport system to avoid traffic congestion problem.
- Published
- 2020
- Full Text
- View/download PDF
7. An Automated Software Size Measurement Tool based on Generation Model using COSMIC Function Size Measurement
- Author
-
Myint Myint Lwin, Thandar Zaw, Koichiro Ochimizu, and Swe Zin Hlaing
- Subjects
Measure (data warehouse) ,Computer science ,business.industry ,Diagram ,Software development ,Petri net ,Software ,Unified Modeling Language ,Computer engineering ,Systems Modeling Language ,business ,computer ,Software measurement ,computer.programming_language - Abstract
At present, most of the software industries need the well-defined models and standard measurement methods to measure the size of software. They are useful in the estimation of effort and time that are extensively used at the early stage of software development. COSMIC Functional Size Measurement (FSM) is one of the recognized methods to estimate the size of software project. The several research initiatives have focused on COSMIC FSM procedure with specific design diagram notation by manually and automatically. However, manual measurement of the various diagrams is time-wasting and difficult to measure the accurate size of the software. Therefore, the automated measurement of function size which includes the generation model based on three different diagram notations such as UML, SysML and Petri net and general mapping rules between COSMIC FSM and generation model to measure the size of software is proposed in this paper. The manual measurement of cooker system by using the generation model and COSMIC concept is successfully done in our previous paper. This proposed automated tool can handle various types of diagramming and get the size of software correctly.
- Published
- 2019
- Full Text
- View/download PDF
8. Hybrid Partition Around Medoids Algorithm for Large Volume of Data
- Author
-
Swe Zin Hlaing, Kyawt Kyawt San, and Nway Yu Aung
- Subjects
ComputingMethodologies_PATTERNRECOGNITION ,Distributed database ,Ant colony optimization algorithms ,Scalability ,Cluster analysis ,Partition (database) ,Algorithm ,Medoid ,Bat algorithm ,Bees algorithm - Abstract
Clustering is a crucial data-mining tool for analyzing valuable information from a massive data volume. Partition Around Medoids (PAM), one of the clustering algorithms that is simple, scalable and can easily implement but sensitive to initial medoids and vast amount of data. Meta-heuristics algorithms such as Ant Colony Optimization algorithm, Bat algorithm, Bees algorithm, etc. used to introduce the combinative in the clustering algorithm that will gives optimum medoids and hence find the better cluster quality. But, the main issue of very large data is in time consumption and lack of quality. To avoid issued of time consumption, existing clustering approaches are run on parallel frameworks. So, this paper proposed the hybrid approach to integrate PAM and Bat which one of meta-heuristic algorithm to obtain optimal initial medoids and PAM to get the better clusters. To handle a large number of datasets for fast and parallel processing, all experiments are done in Apache Spark Framework.
- Published
- 2019
- Full Text
- View/download PDF
9. Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption
- Author
-
Phyo Wah Wah Myint, Ei Chaw Htoon, and Swe Zin Hlaing
- Subjects
Revocation ,business.industry ,Computer science ,Data security ,Access control ,Plaintext ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,Computer security ,computer.software_genre ,Ciphertext ,Key (cryptography) ,business ,computer - Abstract
Ciphertext-policy Attributes-based Encryption (CP-ABE) is an encouraging cryptographic mechanism. It behaves an access control mechanism for data security. A ciphertext and secret key of user are dependent upon attributes. As a nature of CP-ABE, the data owner defines access policy before encrypting plaintext by his right. Therefore, CP-ABE is suitable in a real environment. In CP-ABE, the revocation issue is demanding since each attribute is shared by many users. A policy-based revolutionary CP-ABE scheme is proposed in this paper. In the proposed scheme, revocation takes place in policy level because a policy consists of threshold attributes and each policy is identified as a unique identity number. Policy revocation means that the data owner updates his policy identity number for ciphertext whenever any attribute is changed in his policy. To be a flexible updating policy control, four types of updating policy levels are identified for the data owner. Authorized user gets a secret key from a trusted authority (TA). TA updates the secret key according to the policy updating level done by the data owner. This paper tests personal health records (PHRs) and analyzes execution times among conventional CP-ABE, other enhanced CP-ABE and the proposed scheme.
- Published
- 2019
- Full Text
- View/download PDF
10. Analysis of accident severity factor in Road Accident of Yangon using FRAM and Classification Technique
- Author
-
Koichiro Ochimizu, Nyein Thwet Thwet Aung, Swe Zin Hlaing, and Kyi Pyar Hlaing
- Subjects
Accident (fallacy) ,Naive Bayes classifier ,Resonance analysis ,Road accident ,Economic indicator ,Computer science ,Statistics ,Severity factor ,Accident analysis ,Independence (probability theory) - Abstract
Road accidents are unpredictable and undetermined occurrence. Analysis of road accidents needs to understand the factor causing road accident severity. Careful analysis of road accident record is important to find out leading indicator factor for road accident. This paper introduces the analysis of severity factor using Functional Resonance Analysis Method (FRAM) that can be used an accident analysis method providing a new concept for people to analyze accidents. It also applies Naive Bayes (NB) Algorithm is one of the classification techniques and based on probability models that incorporate strong independence assumptions. In this paper, firstly, FRAM shows the model of analysis of road accident. Secondly NB algorithm applies to calculate the probability of severity level attribute. Finally, this paper shows some experiment of the real dataset of road accident in Yangon by applying the actual scenario. The result shows that the performance variability from the function of the model such as accident time, causes of accident reason and type of vehicle are important factor to lead the level of road accident severity.
- Published
- 2019
- Full Text
- View/download PDF
11. The Measurement of Software Size based on Generation Model using COSMIC FSM
- Author
-
Swe Zin Hlaing, Myint Myint Lwin, Koichiro Ochimizu, and Thandar Zaw
- Subjects
business.industry ,Computer science ,Process (engineering) ,media_common.quotation_subject ,Computer Science::Software Engineering ,Petri net ,Metamodeling ,Software development process ,Software ,Sequence diagram ,Software engineering ,business ,Function (engineering) ,Software measurement ,media_common - Abstract
The software size measurement plays essential roles in developing a software project to estimate costs, efforts and other resources. It provides the necessary input to estimate the effort at the early stage of the software development process. Thus, COSMIC FSM (Common Software Measurement International Consortium Functional Size Measurement) is one of the well-known methods of FSM which is suitable to estimate the size of software project at the early stage of development process. The industries use not only the standardized methods but also the well-defined modeling notations to measure the functional size of software. Some research has focused on the specific design notations to facilitate the design of the system. Therefore, this paper proposes a new model which is named as a generation model that can be accepted from various types of modeling notations and then these types converted into common general model for calculating the functional size of COSMIC concept. The generation model can help many researchers and estimators to understand the concepts of complex diagram notations easily. Then, the mapping rules define between the COSMIC FSM and generation model to measure the size of software. Finally, the function size results of the system are calculated by using COSMIC method.
- Published
- 2019
- Full Text
- View/download PDF
12. An Integrated Cost-Effective Security Requirement Engineering Process in SDLC Using FRAM
- Author
-
Koichiro Ochimizu and Swe Zin Hlaing
- Subjects
Security engineering ,Software ,Risk analysis (engineering) ,Requirements engineering ,Computer science ,business.industry ,Risk analysis (business) ,Process (engineering) ,Systems development life cycle ,Information system ,Misuse case ,business - Abstract
Software engineers should be aware of the security threats and should implement proper degree of security mechanisms that meet the security requirements. Everyone knows, however, that building secure system is expensive. We need to have security engineering processes that help us to develop secure systems in cost-effective way. Cost-effective way means that we should pay attention on how much cost spent on the security failures and what level of security mechanisms we must ascertain in advance. This paper proposed the integration framework of two processes: security engineering process and risk-driven process to implement cost-effective secure system in each phase of SDLC. Functional Resonance Analysis Method (FRAM) has used as a tool for integration. By using this integrated framework, we can find out the impact of risk included in each phase and it is very useful for maintaining and evolution of the process. Then, we adopted the integrated process in the case of UIT's Information System Environment. Finally, the integrated system captures the cost-effective security requirements to demonstrate the misuse case by performing quantitative risk analysis.
- Published
- 2018
- Full Text
- View/download PDF
13. An Authenticated Paradigm for Mobile Agent System in Online Examination
- Author
-
Swe Zin Hlaing
- Subjects
Authentication ,business.industry ,Computer science ,Mobile computing ,Public key infrastructure ,computer.software_genre ,Computer security ,Server ,Key (cryptography) ,Mobile agent ,Web service ,business ,computer ,Host (network) ,Computer network - Abstract
Mobile agents are active objects that can autonomously migrate in a heterogeneous network to perform tasks on behalf of their owners. Mobile agents also raise several security issues related to the protection of host resources and the data carried by an agent itself. In this paper, we present a framework which is concerned with creating Web-based services for Virtual Learning Environment (VLE) related to Student Assessment using mobile agent technology. In our system, agents protect their secured data by carrying their own protection mechanisms and communicate with multiple agents using a single server. This system improves traditional solutions, where protection was managed by the agent. The authentication of mobile agents is controlled by using digital signature and a Public Key Infrastructure. We have implemented this scheme in Mobile Aglet platform.
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.