Browsing by Title

Sort by: Order: Results:

  • Myint, Khin Swe Swe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Virtualization techniques provide the carving individual physical servers into multiple virtual containers that can be run and managed separately. However, due to the uncertainty of workload variation, the workloads ...
  • Aye, Mya Mya (Unversity of Computer Studies, Yangon, 2020-01)
    Decision support systems are gaining an increased popularity in various domains, including business, engineering, the military, and medicine. They are especially valuable in situations in which the amount of available ...
  • Aung, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases ...
  • Aung, Ohnmar; Thein, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases (middle ...
  • Paing, Aye Myat Myat (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Business applications running on IT infrastructure necessitate high levels of availability in order to minimize the amount of downtime experienced during any planned and unplanned outages. As a result, disaster recovery ...
  • Thu, Yin Yin; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The explosive growth of location-detection devices, wireless communications, and mobile internet has resulted in the realization of locationbased services as commercial products and research prototypes. Unfortunately, ...
  • Aung, Nay Win; Thein, Thin Lai Lai (ICCA, 2021-02-25)
    In order to reduce the risks related to the expressway vehicle accidents, it is considered that the timely hazard information and the prompt rescue operations are the vital elements to save the victims and users of the ...
  • ZAW MYINT, AUNG (University of Computer Studies, Yangon, 2022-02-01)
    With the rapid development of mobile technology, location-based services (LBS) have become essential useful services to provide geographic information to mobile users. Location-based services (LBS) support the relevant ...
  • Thu, Myint; Sein, Myint Myint (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    With the development of mobile Internet, more and more people begin to get convenient service by mobile phones. Obtaining one's current location by GPS positioning or network positioning has become one of the important ...
  • Kyaw, Chu Sandy (University of Computer Studies, Yangon, 2022-06)
    The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a wide-area network, using a leader-follower replication strategy. LLFT provides application-transparent ...
  • Tun, Zayar (University of Computer Studies, Yangon, 2022-12)
    Generally, low-light image enhancement techniques are mostly not just made to achieve both visual quality and computational efficiency but also commonly invalid in unknown complex scenarios. The system is focused on ...
  • Zin, Wai Wai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to advances in technologies, most of the information is kept electronically. Steganography and Cryptography are two popular ways of sending vital information in a secret way. In this paper, an image steganography ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • Kyaw, May Thu; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The increasing popularity of smartphones and tablets has introduced Android malware which is rapidly becoming a potential threat to users. A recent report indicates the alarming growth rate of Android malware in which ...
  • Aung, Swe Swe; Khaing, Kyawt Yin; Aung, May Phyo; Phyo, Nang Wai Wai; Aung, Darli Mying; Naing, Thinn Thu (ICCA, 2021-02-25)
    Digital contact tracing is one of supportive tools for the prevention and reduction of wide spread of the covid-19 virus. Machine learning is one of the most supportive approaches for contact tracing applications. Thus, ...
  • Yi, Htay Htay; Aye, Zin May (ICCA, 2021-02-25)
    Today, malicious users are widespread and are frequently lengthening worldwide. So, network security becomes crucial in the domain of education, government, business, and other sectors with related network connections. The ...
  • Khaing, Myint Soe; Aye, Zin May; Tun, Thazin (ICCA, 2021-02-25)
    Internet of Things(IoT) security is one of the main issues when executing and creating IoT platforms. The significant increment of the IoT devices in smart homes and other smart infrastructure make numerous attacks on these ...
  • San, Pan Ei; Aye, Nilar (International Journal of Advances in Electronics and Computer Science, 2015-03)
    Web pages not only contain main content, but also other elements such as navigation panels, advertisements and links to related documents. To ensure the high quality of web page, a good boilerplate removal algorithm is ...
  • San, Pan Ei; Aye, Nilar (Seventh TheIIER International Conference, Singapore, 2015-01)
    Web pages not only contain main content, but also other elements such as navigation panels, advertisements and links to related documents. To ensure the high quality of web page, a good boilerplate removal algorithm is ...
  • Thuai, Khaing Mar; Thant, Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Decision Tree algorithms are the most popular algorithms for classification in data mining field. The main goal of classification is prediction of the categorical labels (classes). In this system, ID3 algorithm is used to ...

Search Repository

Browse

My Account