Papers by Htet Htet Naing
Journal of Industrial and Engineering Chemistry
Proceedings of the 2021 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation
With the increasing popularity of Digital Twin, there is an opportunity to employ deep learning m... more With the increasing popularity of Digital Twin, there is an opportunity to employ deep learning models in symbiotic simulation system. Symbiotic simulation can replicate multiple what-if simulation instances from its real-time reference simulation (base simulation) for short-term forecasting. Hence, it is a useful tool for just-in-time decision making process. Recent trends on symbiotic simulation studies emphasize on its combination with machine learning. Despite its success and usefulness, very few works focus on application of such a hybrid system in microscopic traffic simulation. Existing application of machine (deep) learning models in microscopic traffic simulation is confined to either predictive analysis or offline simulation-based prescriptive analysis. Thus, there is also lack of work on updating parameters of a deep learning model dynamically for real-time traffic simulation. This is necessary if the learning-based model is to be used as part of the base simulation so that "Just-in-time (JIT)" what-if simulation initialized from the model can make better short-term forecasts. This paper proposes a data-driven modelling and simulation framework to dynamically update parameters of Long Short-term Memory (LSTM) for JIT microscopic traffic simulation. Extensive experiments were carried out to demonstrate its effectiveness in terms of more accurate short-term forecasting than other baseline models.
2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC)
ACM Transactions on Modeling and Computer Simulation
Symbiotic simulation systems that incorporate data-driven methods (such as machine/deep learning)... more Symbiotic simulation systems that incorporate data-driven methods (such as machine/deep learning) are effective and efficient tools for just-in-time (JIT) operational decision making. With the growing interest on Digital Twin City, such systems are ideal for real-time microscopic traffic simulation. However, learning-based models are heavily biased towards the training data and could produce physically inconsistent outputs. In terms of microscopic traffic simulation, this could lead to unsafe driving behaviours causing vehicle collisions in the simulation. As for symbiotic simulation, this could severely affect the performance of real-time base simulation models resulting in inaccurate or unrealistic forecasts, which could, in turn, mislead JIT what-if analyses. To overcome this issue, a physics-guided data-driven modelling paradigm should be adopted so that the resulting model could capture both accurate and safe driving behaviours. However, very few works exist in the development ...
Aging is a lifelong and inevitable process. As a human being, every person wants to have a long l... more Aging is a lifelong and inevitable process. As a human being, every person wants to have a long life. With the aim to promote active and healthy ageing, the Ministry of Health implemented the elderly health care project in Myanmar since 1992-1993. This programme is based on comprehensive health care; promotion, preventive, curative and rehabilitative care. Elderly health care programme has been implemented in 161 townships by the end of year 2013 but nationwide is not yet. Nurses in Myanmar involve in the elderly health care project as a significant contribution to the health of elderly population. There is a little research that demonstrates effectiveness in quantifiable measuring health promotion practices in the elderly. There is a definite need for the elderly population to practice health promotion to improve the quality of life as their life span lengthens. This study will also encourage the nurses to better help the elderly to move to increase health promotion practices. That...
2018 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), 2018
Location of many UAV in a common aviation area increases collision probability. Since 2015 the nu... more Location of many UAV in a common aviation area increases collision probability. Since 2015 the number of papers related to the avoidance of such collisions has increased significantly. The most part of methods and algorithms require increasing computational capacity of on-board computer systems that is essential for detecting and tracking dynamic threats and implementing maneuvers of collision avoidance. Many researchers suggest the usage of automatic dependent surveillance system (ADS-B) or analogues to decrease computational costs for detecting and tracking dynamic threats. Computational costs can be also decreased via replacing numerical algorithms by analytical ones. In the paper a new method of selection and implementation of collision avoidance maneuvers is suggested. UAV trajectories are approximated by two or three trajectory points obtained from ADS-B system. Then, using analytical expressions, two cutoff values of the critical speed range, at which a collision is possible, are calculated. As calculation expressions for meeting points and cutoff values of the critical speed are represented in the analytical form, even if an on-board computer system has limited computational capacity, the time for calculation will be far less than the time of receiving data from ADS-B. For this reason, calculations can be updated at each cycle of new data receiving, and the trajectory approximation can be bounded by straight lines. Such an approach allows developing compact algorithm of collision avoidance, even for a significant number of UAVs (more than several dozens). Research adequacy is proved by modeling using a software system developed specifically for this purpose.
Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering, 2020
Nowadays, securing information and message transformation are going with electronic way, the secu... more Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using encryption/decryption process. Encryption Process is sender and decryption process are receiver side. Commonly, information can be storing with international language such as English language. At the present time, everyone is trying to be more secure not only English but also own language such as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language by using with more innovative method. To secure such information, encryption/decryption plays an important role in information security. In cryptography, there are several cipher techniques such as, polyalphabetic cipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitution cipher, In this paper, we propose an advanced encryption algorithm ...
The purpose of this study is to investigate the relationship between reasons and attitudes toward... more The purpose of this study is to investigate the relationship between reasons and attitudes towards a particular behavior, in this case, the behavior of returning trays in cafeterias at James Cook University Singapore (JCU). Findings from the study showed that reasons related to self-responsibility and consideration for others had a strong influence on an individual's attitude towards returning trays. However, reasons related to social identity showed no relationship with an individual's attitude towards returning trays.
2020 3rd International Conference on Energy, Power and Environment: Towards Clean Energy Technologies, 2021
This paper proposes the method to analyze the performance of wireless charging DC/DC resonant con... more This paper proposes the method to analyze the performance of wireless charging DC/DC resonant converters in various load conditions including the magnetic coupling effect. The equations for design performance analytical calculations are presented for series-series (SS) and series-parallel (SP) wireless charging DC/DC resonant converters. The equations can be applied in switching frequency sensitivity analysis at different magnetic strength and load resistance conditions to compare the performance of the resonant circuit topologies. The analytical calculation results can be used to size the voltage, current, and power rating of wireless charging resonant circuit components. The accuracy of the analytical calculation is validated by duty cycle control of wireless charging resonant converters in PLECS circuit simulation environment. Experimental results are obtained to support the conclusion drawn from the analytical solutions. The proposed method can be applied to study other wireless charging resonant converter topologies.
Journal of Coatings Technology and Research, 2020
Corrosion-resistant superhydrophobic surfaces were successfully fabricated on galvanized steel th... more Corrosion-resistant superhydrophobic surfaces were successfully fabricated on galvanized steel through a wet oxidation treatment and stearic acid modification. In this work, the formation mechanism of superhydrophobic surfaces and structures were characterized with contact angle meter, scanning electron microscope (SEM), X-ray diffractometer (XRD), and Fourier transform infrared spectroscopy (FTIR). The surface properties of superhydrophobic and non-superhydrophobic surfaces were assessed by calculating surface free energy (γ) and work of adhesion (W st). Moreover, the corrosion behavior and durability of superhydrophobic surfaces were examined in 3.5 wt% NaCl solution for up to 14 days. Superhydrophobic galvanized surfaces with WCAs of 168°(γ=0.01 mN/m and 1.57 mN/m) and 162°(γ=0.04 mN/m and W st = 3.52 mN/m) were successfully obtained by modifying HCl etched surfaces with ethanolic stearic acid, with or without wet oxidation. According to the results, a zinc stearate layer on the surfaces effectively enhanced their corrosion resistance by numerous air pockets on the surfaces with hierarchical micro-/nanostructures that inhibited penetration by the NaCl solution. Moreover, superhydrophobic as-synthesized ZnO surface by wet oxidation had better corrosion durability than a superhydrophobic etched surface because of the strong physical and chemical bonding of stearic acid onto the as-synthesized ZnO nanorods.
Journal of Experimental Agriculture International, 2020
Microbial diversity of cultivated soil is the key resource for maintaining the functional capacit... more Microbial diversity of cultivated soil is the key resource for maintaining the functional capacity of agricultural and natural ecosystem. The research aimed to study the prevalence of soil fungi from the soils of rice and napier grass fields. Soil samples were collected from the fields of rice in flooded condition and napier grass in the upland condition at the University farm. Soil fungi were cultured on RB media through the serial dilution method. A total of 13 isolates were cultured, in which 11 from the soil collected from rice cultivated field and 2 from napier grass field. Seven out of 11 isolates collected from rice and 2 from napier grass were selected and identified through the morphological characters such as colony color, mycelium diameter, color and segmentaiton, spore size and color. Mycelium growths were examined on the PDA and RB media. Fungal isolates collected in this study were morphologically identified/ characterized as Aspergillus niger, A. flavus, A. terreus, A...
Agronomy, 2020
The pigeon pea cyst nematode, Heterodera cajani, is an economically important plant-parasitic nem... more The pigeon pea cyst nematode, Heterodera cajani, is an economically important plant-parasitic nematode in sesame production. The objective of the study was to investigate distribution of H. cajani in the major sesame producing areas in Myanmar. Before cultivation, soil samples were collected in 96 local farmer’s fields: (19 fields in Magway, 20 fields in Mandalay, 14 fields in Sagaing and 43 in Nay Pyi Taw), and nematode density was quantified by real-time PCR. The cyst nematode was detected in 63.2% of the fields in Magway and the mean density was 22.6 eggs equivalent (20 g soil)−1. In Mandalay and Nay Pyi Taw, the cyst nematode was detected in 40.0% and 18.6% of the fields with the mean densities of 9.9 and 21.0 eggs equivalent (20 g soil)−1, respectively. By contrast, the cyst nematode was not detected in Sagaing fields, in which sesame is rotated with paddy rice. Infestation of root-knot nematodes (RKN, Meloidogyne spp.) was also evaluated, because sesame is generally rotated wi...
Science of The Total Environment, 2020
et al., Sepiolite supported BiVO4 nanocomposites for efficient photocatalytic degradation of orga... more et al., Sepiolite supported BiVO4 nanocomposites for efficient photocatalytic degradation of organic pollutants: Insight into the interface effect towards separation of photogenerated charges, Science of the Total Environment (2020),
Journal of Physics: Conference Series, 2018
The article represents a new approach of defining potential collision of two or more UAVs in a co... more The article represents a new approach of defining potential collision of two or more UAVs in a common aviation area. UAVs trajectories are approximated by two or three trajectories' points obtained from the ADS-B system. In the process of defining meeting points of trajectories, two cutoff values of the critical speed range, at which a UAVs collision is possible, are calculated. As calculation expressions for meeting points and cutoff values of the critical speed are represented in the analytical form, even if an on-board computer system has limited computational capacity, the time for calculation will be far less than the time of receiving data from ADS-B. For this reason, calculations can be updated at each cycle of new data receiving, and the trajectory approximation can be bounded by straight lines. Such approach allows developing the compact algorithm of collision avoidance, even for a significant amount of UAVs (more than several dozens). To proof the research adequacy, modeling was performed using a software system developed specifically for this purpose.
Materials Research Express, 2019
An anti-corrosive superhydrophobic surface was successfully fabricated on a galvanized coating of... more An anti-corrosive superhydrophobic surface was successfully fabricated on a galvanized coating of a porcelain insulator’s pin in HVAC transmission line, using the New NaCl-SPS immersion method and stearic surface modification. After 3 days immersion in New NaCl-SPS solution, the stable passive layer was formed on the galvanized surface and it was confirmed as highly crystallized ZnO layer with hexagonal wurtzite structure, which is environmentally friendly. This work represents a new route for the synthesis of ZnO micro and nano-structures on the galvanized coating by immersion in New NaCl-SPS solution. Moreover, the superhydrophobic surface has been successfully fabricated on the synthesized ZnO surfaces. The corrosion resistance of galvanized surfaces with or without superdydrophobicity has been investigated. The results demonstrate that the superhydrophobicity can effectively enhance corrosion resistance, to counter pin corrosion problems of electrical insulators and porcelain br...
International Journal of Machine Learning and Computing, 2019
Fast progression of digital data exchange in electronic way, information security is becoming muc... more Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission on public communication networks. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. In cryptography, there are various cipher techniques such as monoalphabetic cipher, polyalphabetic cipher, etc. to support data confidentiality as security mechanisms. They are methods of encrypting plain text message into cipher text protecting it from adversaries. The process of encryption of alphabets is the converting original message into non readable form. One of the most popular cipher techniques is the Vigenè re cipher. It is a polyalphabetic cipher technique which uses the Vigenè re table for the process of encryption of alphabets. As the Vigenè re cipher does not have the properties of diffusion and confusion, it is longer vulnerable to Kasiski and Friedman attacks based on letter frequency analysis. Thus, in this paper we propose a polyalphabetic cipher that is a new encryption and decryption technique with diffusion and confusion properties based on the concept of the complex cipher used by combining of Vigenè re cipher with Affine cipher for the increase of data security in data storage and transmission on public communication networks. Our proposed technique can also be considered as a complex transformation technique from Affine cipher known as a monoalphabetic cipher technique to a new polyalphabetic cipher technique that is called Vigenè re-Affine cipher.
Uploads
Papers by Htet Htet Naing