Technological University (Hmawbi)
Home
(current)
About Us
About University
Organizatoin Chart
Student Communities
Academic
Online Registration
Departments
Programs
News/Career
News And Announcements
All News/ Announcements
Department of Civil Engineering
Department of Architecture
Department of Electronic Engineering
Department of Electrical Power Engineering
Department of Mechanical Engineering
Department of Mechatronic Engineering
Department of Information Technology
Department of Myanmar
Department of English
Department of Engineering Mathematics
Department of Engineering Physics
Department of Engineering Chemistry
Career News
Library
Euclid Prime
Duke U Press
EBSCO
Research
International Collaboratoins
Contact Us
Research
We do research to help society
Department of Information Technology
Research Conducted By Our Department
Image Processing
High Confidence Identification System Based on Iris Pattern
High Confidence Identification System Based on Iris Pattern
Implementation of Face Recignition System
Implementation of Face Recignition System
Factor Analysis-based Video Genre Classification using MARS
Factor Analysis-based Video Genre Classification using MARS
An Approach to Classify Video Genre using MARS Classifier
An Approach to Classify Video Genre using MARS Classifier
Video Genre Classification Uing MARS based on Factor Analysis Method
Video Genre Classification Uing MARS based on Factor Analysis Method
Audio-based Classification of Video Genre Using Multivariate Adaptive Regression Splines
Audio-based Classification of Video Genre Using Multivariate Adaptive Regression Splines
Video Genre Classification Based on MARS
Video Genre Classification Based on MARS
An Imoproved Fuzzy-based Image Filtering for High Density Salt and Pepper Noises
An Imoproved Fuzzy-based Image Filtering for High Density Salt and Pepper Noises
Enhancing in Group Signature Scheme with Member Revocation and Anomymity
Enhancing in Group Signature Scheme with Member Revocation and Anomymity
An Approach to Enhance in Group Signature Scheme with Anomymous Revocation
An Approach to Enhance in Group Signature Scheme with Anomymous Revocation
Efficient Group Signature Scheme with Anonymous Membership Revocation
Efficient Group Signature Scheme with Anonymous Membership Revocation
A New Group Signature Scheme with Efficient Membership Revocation
A New Group Signature Scheme with Efficient Membership Revocation
Face and Eye Detection System using Haar Cascade Classifier and Symmetry Detection
Face and Eye Detection System using Haar Cascade Classifier and Symmetry Detection
Eye Detection System using Orientation Histogram
Eye Detection System using Orientation Histogram
Detection System using Colour Image Processing and Symmetry Detection
Detection System using Colour Image Processing and Symmetry Detection
Performance Evaluation of Eye Detection Syst
Performance Evaluation of Eye Detection Syst
Digital Watermarking System for Copyright Protection
Digital Watermarking System for Copyright Protection
Implementation of Digital Watermarking System Based on DWT and SVD
Implementation of Digital Watermarking System Based on DWT and SVD
Watermarking System Using DWT and SVD
Watermarking System Using DWT and SVD
Design and Implementation of Student Attendance System by Using Face Recognition
Design and Implementation of Student Attendance System by Using Face Recognition
Design and Implementation of Student Attendance System by Using Face Recognition
Design and Implementation of Student Attendance System by Using Face Recognition
Cryptography & Network Security
Speech Encryption and Decryption Using Linear Feedback Shift Register(LFSR)
Speech Encryption and Decryption Using Linear Feedback Shift Register(LFSR)
Speech Encryption Using Linear Feedback Shift Register
Speech Encryption Using Linear Feedback Shift Register
Design and Implementation of ALU and Bus-Based Multiprocessors
Design and Implementation of ALU and Bus-Based Multiprocessors
Text Steganography System for Myanmar Caracters
Text Steganography System for Myanmar Caracters
Text Steganography using Word Spelling Method
Text Steganography using Word Spelling Method
Performance Comparison of File Security System Using Tea and Blowfish Algorithms
Performance Comparison of File Security System Using Tea and Blowfish Algorithms
Combination of Cryptography and image Steganography of data Security
Combination of Cryptography and image Steganography of data Security
Phishing Prevention voting System Based on Visual Cryptography
Phishing Prevention voting System Based on Visual Cryptography
Classification of Signature in banking system using KNN
Classification of Signature in banking system using KNN
Fuzzy and Image Processing
A New Fuzzy Based Filter for High Density Salt and Pepper Noise
A New Fuzzy Based Filter for High Density Salt and Pepper Noise
Mobile Agent/AI
Mobile Agent based Major Classification System for TU
Mobile Agent based Major Classification System for TU
Secure Question Disttibution System Using Mobile Agent
Secure Question Disttibution System Using Mobile Agent
Mobile Agent based relization of security Question Distribution System
Mobile Agent based relization of security Question Distribution System
AI
Placement of Shoe Components on Leather using Genetic Algorithm
Placement of Shoe Components on Leather using Genetic Algorithm
RSS-Fingerprinting-Based Indoor Wireless Communication with Receiver Orientation using Machine Learning Algorithms
RSS-Fingerprinting-Based Indoor Wireless Communication with Receiver Orientation using Machine Learning Algorithms
RSS-Fingerprinting-Based Indoor Wireless Communication with Receiver Orientation using Machine Learning Algorithms
RSS-Fingerprinting-Based Indoor Wireless Communication with Receiver Orientation using Machine Learning Algorithms
Data Management
Performance Comparison between Sense-based Information Retrieval and Keyword-based Information Retrieval
Performance Comparison between Sense-based Information Retrieval and Keyword-based Information Retrieval
Data Mining
Using K-Means Clustering Algorithm to Analyze Moodle Lob Data
Using K-Means Clustering Algorithm to Analyze Moodle Lob Data
Academic Achievement Perdition Based on Student Performance
Academic Achievement Perdition Based on Student Performance
Academic Achievement Perdition Based on Student Performance
Academic Achievement Perdition Based on Student Performance
Security
Text Steganography using Word Spelling Method
Text Steganography using Word Spelling Method
Performance Comparison of File Security System Using Tea and Blowfish Algorithms
Performance Comparison of File Security System Using Tea and Blowfish Algorithms
Combination of Cryptography and image Steganography of data Security
Combination of Cryptography and image Steganography of data Security
Phishing Prevention voting System Based on Visual Cryptography
Phishing Prevention voting System Based on Visual Cryptography
Classification of Signature in banking system using KNN
Classification of Signature in banking system using KNN