Today, the world is going to be digitalized in all the ways. Every business units, government and... more Today, the world is going to be digitalized in all the ways. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. These images over the internet which will not be secure. Therefore, there is a need of image security. Currently, there exists various image security techniqueslike encryption, watermarking, steganography, etc.In this paper, we compared image encryption algorithms.Implementations of these algorithms have been realized for experimental purpose. The results of analysis are given in this paper.
Multiple hosts wish to receive the same data from one or more senders. Multicast routing defines ... more Multiple hosts wish to receive the same data from one or more senders. Multicast routing defines extensions to IP routers to support broadcasting data in IP networks. Multicast data is sent and received at a multicast address which defines a group. Data is sent and received in multicast groups via routing trees from sender s to receivers. Demonstrative lectures require to share the computer screen of the lecturer to the students as well as to make discussion with the students. The Multicast protocol is the most suitable method because of its capability in speed and better synchronized process. The word multicast is typically used to refer to IP multicast which is often employed for streaming media, and Internet television applications. Wit Yee Swe | Khaing Thazin Min | Khin Chan Myae Zin | Yi Yi Aung "Classroom Shared Whiteboard System using Multicast Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Vol...
Sentiment analysis is an approach to explore whether collected content is in a positive, negative... more Sentiment analysis is an approach to explore whether collected content is in a positive, negative, or neutral state. When thinking varied prospects, for instance, celebrities, politicians, food, places, or another topic, sentiment analysis is employed to examine people's opinions, likes, and interests. Social media are additionally used to communicate our feelings on items and administrations. The remarks and evaluations of millions of clients of the social site can be gathered to extricate their perspectives and emotions towards any item or administration and utilize this data for future business and business enhancements or for domain investigation. This paper presents an open source approach where we gather tweets from the Twitter API, at that point preprocessing, investigate, and visualize those tweets. This sentiment analysis depends on retrieving text information from the communicated web, at that point characterizing individuals' perspectives into three remarkable not...
Advances in Science, Technology and Engineering Systems Journal
In this modern age, information technology (IT) plays a role in a number of different fields. And... more In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and methods used in ID. Each approach has merits and demerits. Therefore this paper highlights the similar distribution of attacks nature by using K-means and also the effective accuracy of Random Forest algorithm in detecting intrusions. This paper describes full pattern recognition and machine learning algorithm performance for the four attack categories, such as Denial-of-Service (DoS) attacks (deny legitimate request to a system), Probing attacks (information gathering attacks), user-to-root (U2R) attacks (unauthorized access to local super-user), and remote-to-local (R2L) attacks (unauthorized local access from a remote machine) shown in the KDD 99 Cup intrusion detection dataset.
Advances in Science, Technology and Engineering Systems Journal
In this modern age, information technology (IT) plays a role in a number of different fields. And... more In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and methods used in ID. Each approach has merits and demerits. Therefore this paper highlights the similar distribution of attacks nature by using K-means and also the effective accuracy of Random Forest algorithm in detecting intrusions. This paper describes full pattern recognition and machine learning algorithm performance for the four attack categories, such as Denial-of-Service (DoS) attacks (deny legitimate request to a system), Probing attacks (information gathering attacks), user-to-root (U2R) attacks (unauthorized access to local super-user), and remote-to-local (R2L) attacks (unauthorized local access from a remote machine) shown in the KDD 99 Cup intrusion detection dataset.
Uploads
Papers by Yi Yi Aung