Myint, Zin W.
16  results:
Search for persons X
?
1

Monitoring Edge-Geodetic Sets in Graphs: Extremal Graphs, B..:

, In: Algorithms and Discrete Applied Mathematics; Lecture Notes in Computer Science,
 
?
2

The Assessment of Deforestation, Forest Degradation, and Ca..:

, In: Environmental Change in the Himalayan Region,
 
?
3

Effective Web Application Vulnerability Testing System Usin..:

, In: 2023 IEEE Conference on Computer Applications (ICCA),
Aung, Thinzar ; Myint, Zin Thu Thu - p. 189-193 , 2023
 
?
4

Reconfigurable smart water quality monitoring system in IoT..:

, In: 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS),
Myint, Cho Zin ; Gopal, Lenin ; Aung, Yan Lin - p. 435-440 , 2017
 
?
5

An exploratory study on senior citizens' perceptions of the..:

, In: Proceedings of the 3rd International Convention on Rehabilitation Engineering & Assistive Technology,
 
?
7

The Measurement of Software Size based on Generation Model ..:

, In: 2019 23rd International Computer Science and Engineering Conference (ICSEC),
 
?
8

Contributors:

, In: Nanotube Superfiber Materials,
Abdulhafez, Moataz ; Aboagye, Alex ; Abot, Jandro L.... - p. xxv-xxxiii , 2019
 
?
9

Machine Learning-Based Performance Analysis for IoT Attacks..:

, In: 2023 IEEE Conference on Computer Applications (ICCA),
Khaing, Myint Soe ; Aye, Zin May ; Tun, Thazin - p. 375-380 , 2023
 
?
10

Grape Leaf Diseases Classification using Convolutional Neur..:

, In: 2020 International Conference on Advanced Information Technologies (ICAIT),
 
?
11

Multi-Criteria Decision Analysis in Urban Transport System ..:

, In: 2020 International Conference on Advanced Information Technologies (ICAIT),
 
?
12

An Automated Software Size Measurement Tool based on Genera..:

, In: 2019 International Conference on Advanced Information Technologies (ICAIT),
 
?
13

Policy-based Revolutionary Ciphertext-policy Attributes-bas..:

, In: 2019 International Conference on Advanced Information Technologies (ICAIT),
 
?
14

A Policy Revocation Scheme for Attributes-based Encryption:

, In: Proceedings of the 10th International Conference on Advances in Information Technology,
 
?
15

EAC: Encryption Access Control Scheme for Policy Revocation..:

, In: 2020 International Conference on Advanced Information Technologies (ICAIT),
 
1-15