UCSY

Dr.  Mie Mie Su Thwin

Ph.D(IT)
Professor
Faculty :Faculty of Information Science
Lab :Cyber Security
Postal address :University of Computer Studies, Yangon
Email :_

Academic Qualifications:

  • B.Sc..(Physics)   from University of Yangon    at 9/6/1994
  • B.Sc.(Hons)(Phys.)   from University of Yangon    at 9/6/1996
  • M.I.Sc.(Credit)   from University of Computer Studies, Yangon    at 9/6/2000
  • Ph.D (IT)   from University of Computer Studies, Yangon    at 1/4/2004

List of Publications

  1. " Domain Model Mapping Using Unified Modeling Language in Modeling Environments "  , 1 st International Conference on Computer Applications [ICCA 2003], January 2003, Myanmar.
  2. " Impact Analysis Study of Dependency Relationships of UML "  , International Conference on Internet Information Retrieval[IRC 2003], October 2003, KOREA.
  3. " Impact Analysis of UML Diagrams based on Relationships of UML "  , International Conference for Software Engineering, [IASTED], February 2004, AUSTRIA.
  4. " An Impact Analysis on Diagram Types and Relationships of UML "  , 2 nd International Conference on Computer Applications [ICCA 2004], January 2004, MYANMAR.
  5. " A Study on Variations of UML CASE Tools "  , 2 nd International Conference on Computer Applications [ICCA 2004], January 2004, MYANMAR.
  6. " Consistency Issue: An Impact Analysis on Changes of the Artifacts of UML "  , International Conference on Internet Information Retrieval [IRC 2004], November 2004, KOREA.
  7. " Comparison between Two-Phase Commit Protocol and ThreePhase Commit Protocol: Practical Approach "  , 5th International Conference on Computer Applications [ICCA 2004], January 2004, MYANMAR.
  8. " Semantic XML Clustering Using KMean Algorithm. "  , 1 st International Conference on Applied Information and Communication Technology, September 2008, MYANMAR.
  9. " Improving Source Code behind the Scenes "  , 1 st International Conference on Applied Information and Communication Technology, September 2008, MYANMAR.
  10. " Practical Approach: Importance of Database Integrity Constraints in the Distributed Database Systems "  , 1 st International Conference on Applied Information and Communication Technology, September 2008, MYANMAR.
  11. " Update Propagation on Lazy and Eager Replication with Master and Group Replication Databases. "  , 1 st International Conference on Applied Information and Communication Technology, September 2008, MYANMAR.
  12. " An Adaptive System for the Personalized Access to Music "  , 1 st International Conference on Applied Information and Communication Technology, September 2008,MYANMAR.
  13. " MISTY1 Encryption System with RSA Key Distribution "  , 1 st International Conference on Applied Information and Communication Technology, September 2008, MYANMAR.
  14. " Extracting Semantic Net from a Domain Corpus "  , 1 st International Conference on Applied Information and Communication Technology, September 2008, MYANMAR.
  15. " Developing a Java Based Application Analyzer "  , 1 st International Conference on Applied Information and Communication Technology, September 2008, MYANMAR.
  16. " Comparative Study of Levenshtein Distance and Needleman-Wunsch English Spelling Checking Algorithms "  , 2nd International Conference on Applied Information and Communication Technology, November 2009, Myanmar.
  17. " Using Business Process Reengineering (BPR) for Electronic Voting "  , 2nd International Conference on Applied Information and Communication Technology, November 2009, Myanmar.
  18. " Proposed Myanmar Word Tokenizer based on LIPIDIPIKAR treatise "  , International Conference on Computer Engineering and Technology [ICCET], April 2010, CHINA.
  19. " Semantic Web Information Retrieval in XML by mapping to RDF schema "  , Networking and Information Technology [ICNIT], 2010 International Conference, June 2010, PHILIPPINE.
  20. " Framework for multi-purpose web log access analyzer "  , 2nd International Conference on Computer Engineering and Technology [ICCET], November 2010, CHINA.
  21. " Analysis of Myanmar Word Using Statistical Approach "  , The second International Workshop on Spoken Languages Technologies for Under-resourced languages (SLTU), May 2010, MALAYSIA.
  22. " Answering Top-k Keyword Queries on Relational Databases. "  , International Journal of Information Retrieval Research 2012 Journal.
  23. " Record Searching Using Dynamic Blocking for Entity Resolution Systems "  , The 9th International Conference on Computing and InformationTechnology, 2013 Singapore.
  24. " Effective Blocking for Combining Multiple Entity Resolution Systems "  , INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING, 2013 Journal.
  25. " Application of Mobile Agent and Cryptography For The Security of Job Applicants on Mobile Phones "  , 3rd International Conference on Computational Techniques and Artificial Intelligence (ICCTA) 2014 Singapore.
  26. " Efficient Dynamic Blocking Scheme for Entity Resolution Systems "  , International Conference on Advances in Engineering and Technology (ICAET) 2014 Singapore.
  27. " Heuristic Rules for Attack Detection Charged by NSL KDD Dataset: "  , International Conference on Genetic and Evolutionary Computing, (ICGEC) 2015 Myanmar.
  28. " Anomalous Behavior Detection in Mobile Network "  , International Conference on Genetic and Evolutionary Computing, (ICGEC) 2015 Myanmar.
News
Computer Universities
Contact us
Contact:
No.(4) Main Road ,
Shwe Pyi Thar Township,
Yangon, Myanmar.
Fax: +95 01 610633
Phone: +95 01 610655
Facebook page: https://www.facebook.com/ucsygn/