
Hlaing Htake Khaung TinUniversity of Information Technology Yangon Myanmar · Faculty of Information Science
Hlaing Htake Khaung Tin
PhD(IT), PGDL
Professor, Faculty of Information Science, University of Information Technology, Yangon, Myanmar
About
97
Publications
36,845
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
203
Citations
Introduction
Hlaing Htake Khaung Tin is a distinguished Professor at the University of Information Technology in Myanmar. Her extensive research interests span various areas including Image Processing, Software Engineering, and Business Information Systems. She holds a range of academic qualifications including a B.C.Sc, B.C.Sc (Hons:), M.C.Sc, Ph.D(IT), and PGDL(Law). She stands as a distinguished figure in the field of IT and continues to make significant contributions to the advancement of technology.
Additional affiliations
April 2017 - June 2017
May 2016 - present
University of Computer Studies, Yangon, Myanmar
Position
- Lecturer
April 2009 - present
University of Computer Studies, Yangon, Myanmar
Position
- Developing the Age Dependent Face Recognition System
Description
- I know what is I know nothing!
Education
April 2009 - January 2014
University of Computer Studies, Yangon, Myanmar
Field of study
- Information Technology
Publications
Publications (97)
Climate and weather patterns play an essential role in shaping the environmental, social, and economic landscapes of regions. This research presents a comprehensive comparative analysis of climate and weather patterns between Hinthada and Yangon, two distinct locations in Myanmar, with the aim of unraveling their implications for regional climate s...
Citation analysis has become an important tool for researchers, publishers, and funding agencies seeking to evaluate the impact and quality of scholarly research. However, it is important to recognize that citation metrics are only one measure of impact and should be interpreted in light of other factors, such as the quality and novelty of the rese...
In recent years, businesses have increasingly relied on digitalization to streamline their operations and improve efficiency. One critical area that often requires manual intervention is invoice processing, which can be time-consuming and prone to errors. This paper aims to explore the application of image processing techniques in automating invoic...
This research paper explores the potential of web-based educational technologies for enhancing Karen language learning. Karen is a minority language spoken by a significant number of people in Southeast Asia, including Thailand and Laos. Despite the importance of the language, there is a lack of resources and educational materials available for Kar...
The outcomes of software engineering can have a significant impact on the success of a software project and the satisfaction of its stakeholders. The results of the study provide a clear understanding of how success can be achieved in a program. Bloom's Revised Taxonomy is a framework used to classify learning outcomes in terms of different levels...
The process of software project management involves planning and supervising the development of software projects to deliver a quality product within the customer's budget and schedule. This process begins with project planning, which includes estimating the work to be done, required resources, and project schedule. Once these activities are accomp...
The process of software project management involves planning and supervising the development of software projects to deliver a quality product within the customer’s budget and schedule. This process begins with project planning, which includes estimating the work to be done, required resources, and project schedule. Once these activities are accomp...
Software testing is a crucial process that ensures the quality and reliability of software products. Two common approaches to software testing are manual and automatic testing. Manual testing involves testers executing test cases manually, while automatic testing involves the use of software tools to execute tests automatically. The choice between...
The purpose of this study is to compare the effectiveness of two widely used cost management approaches - Cost-Volume-Profit (CVP) Analysis and Activity-Based Costing (ABC) - in improving managerial decision-making. A review of the literature indicates that both methods are commonly used in various business contexts, but there is a lack of empirica...
Web-based teaching systems have several advantages and have the potential to benefit education greatly. It is significant to carefully consider learners' and instructors' specific needs and circumstances when deciding whether to use these systems. Using web-based and traditional teaching methods may be appropriate to provide a well-rounded educatio...
Copy-move forgery is a type of image tampering that involves copying a portion of an image and pasting it to another part of the same image with the intention of deceiving the viewer. In recent years, many approaches have been proposed to detect copy-move forgery, including those based on local binary patterns (LBP). In this paper, we perform a com...
Fake image or picture detection is evolving as one of
the famous and popular research themes among researchers in
the field of digital image forensics area. Fake image or picture
is fake by exhausting many different techniques but the highest
common method is copy move counterfeit finding for digital
forensics. The goal of fake image detection...
The proposed system is implemented as the Information Retrieval system by using Domain Ontology. The main point of proposed IR system is the formatting of SPARQL query and context matching process by using SPARQL query. The Ontology-based IR system for Digital Library is implemented based on Service-Oriented Architecture (SOA) by using the XML base...
As an increasing number of cities consists of an increasing number of visiting places, it is more difficult for the visitors to consider. Meanwhile, the system tries to introduce recommendation features to their visitors. The main aim of this paper is to only implement visitor navigation pattern prediction system in Myanmar. The paper uses travelin...
Infectious plant diseases can cause infections, infections, and infections. Infection and Infection. Small organisms infect plants and lose nutrients. Bacteria Insects. Many types of application domains are essential to identify measurement types. This is probably the most important part of a proper diagnostic system. Decisions about crop diseases...
Software engineer is an engineering discipline. It applies to all aspects of software development from the start of the system. Software Engineering is a field of computer science that involves the development and development of computer software and software applications. Computer software is made up of programs that include computer equipment and...
Internet of Things (IoT) is very important sectors in teaching, learning and business today. IoT is expected to give strong impacts on different areas of life including healthcare, transportation, smart homes, smart campus, and the important role in the context of Information and Communication Technologies. In this research, there is a role of Inte...
IoT also has many opportunities for Science, Technology, Engineering, and Mathematics (STEM) disciplines, such as computer programming and physical computing. Temperature plays an important part in our environment. There are many techniques that can be used to detect fire; each one has its own advantages and disadvantages. Some of them are suitable...
Nowadays, the management information system is not only a computer-based human-machine system that can support and help the administrative supervisor but also an open technology system for society into every organization. The major benefit of web-based management information system is that the system supported in one place can be used by thousands...
Nowadays Internet of Things (IoT) is playing important key role in teaching, learning and business. The internet of things is expected to give strong impacts on different areas of life including healthcare, transportation, smart homes, smart campus, and more. And also (IoT) is the important role in the context of Information and Communication Techn...
Tourism Management Information System is the electronic delivery of market research information and decision support tools for the tourism management. It is a platform for tourism associations to exchange data/ information/ knowledge. The decision makers or travelers have to face and take attention with a lot of criteria; such as cost, place type,...
Increasing use is being made of various types of scientific evidence in court. The general requirement for the admissibility of such evidence is relevance. Although expert evidence is considered to be opinion evidence, it is admissible if it can assist the court to decide a fact in issue; provided that it is also reliable.This term paper is studied...
The agriculture based nations of the world, the Myanmar among them, are at present in the formative stages of the information society that is emerging from what was formerly an agriculture society. To complete in this environment, people need to understand what it demands from their organization. Accurate and easy to use Farm Management Information...
This Computer studies is a very important subject in our country because of its numerous and widespread application in addressing individual, organizational and societal problems. The research work examined the effect of attitudes on performance of teachers in Computer University (Loikaw) in Kayah State, Myanmar. Teachers' preference to a particula...
Biometrics helps to provide the identity of the user based on his/her physiological or behavioural characteristics. The physiological characteristics signifies using human body parts for authentication like fingerprint, iris, ear, palm print, face etc. The behavioural characteristics include action done using body parts like voice, signature and ga...
Face recognition is the ability to establish a subject’s identity based on facial characteristics. Face recognition has a wide range of applications, including Human-Computer-interaction, Driver‘s license, National ID, Passports, Voter registration, Security system, Personal device logon, Desktop logon, Information security, Database security, Inte...
Face recognition is the most successful form of human surveillance. Face recognition technology, is being used to improve human efficiency when recognition faces, is one of the fastest growing fields in the biometric industry. In the first stage, the age is classified into eleven categories which distinguish the person oldness in terms of age. In t...
Face and palmprint are two biometric characteristics with the highest user-acceptance. This paper proposes a method which integrates face recognition and palmprint performs the fusion at score level. Two biometric traits are collected and stored into database. The YC b C r and HSV colors paces are applied to skin detection and face extraction. In i...
This paper details with the subjective age prediction of face images using Principal Component Analysis (PCA). The face database is built by the seven individual age groups which are divided from the adult facial images between 10 to 60 years old. An age prediction algorithm is developed for examining the age of individual. Age prediction is concer...
Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that a face is already lo...
Perceiving human faces and modeling the distinctive features of human faces that contribute most towards face recognition are some of the challenges faced by computer vision and psychophysics researchers. There are many methods have been proposed in the literature for the facial features and gender classification. However, all of them have still di...
This paper details with the developing of the age dependent face recognition system. The YC bC r and HSV colors paces are applied to skin detection and face region extraction. The proposed method preserves the identity of the subject while enforcing a realistic recognition effect on adult facial images between 15 to 60 years old that are divided in...
This paper details our approach to building an automatic age determination algorithm based on age grouping. Face recognition has a variety of potential applications in public security, law enforcement and commerce such as identity authentication for credit card or driver license, access control, information security, and video surveillance, etc.. A...
This Automatic age dependent face recognition system is developed. This approach is based on the Principle Component Analysis (PCA). Eigen face approach is used for both age prediction and face recognition. Face database is created by aging groups individually. The age prediction is carried out by projecting a new face image into this face space an...