Browsing by Title

Sort by: Order: Results:

  • Khaing, Aye Aye; Mar, Khin Thet (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In data communication, cryptography is necessary when communication over insecure channel. In many business sectors, secure and efficient data transfer is essential. Cryptography provides the basics for authentication of ...
  • Hliang, Yi Yi; Tun, Khin Nwe Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, XML plays an important role as a de facto standard online data exchange mechanism. In this paper, we present NFA-based filtering technique of XML document for multiple XPath queries using ontology. In our ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...
  • Linn, Khaing Wah Wah; Phyu, Sabai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Nowadays, a large number of web pages contained useful information is often accompanied by a large amount of noise such as banner advertisements, navigation bars, copyright notices, etc. These noise data can seriously ...
  • Sin, Ei Shwe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, scheduling problems arise in almost all areas of human activity. To handle the complexity of the real world scheduling problems, many researchers have been invested over the years. Currently research is being ...
  • San, Lwin; Cho, Ei Mon; Koshiba, Takeshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In proxy re-encryption (PRE) scheme the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. ...
  • Aung, Tun Myat; Hla, Ni Ni (Proceeding of Symbolic Computation and Cryptolog, 2008)
    In this paper we propose the construction of nonlinear pseudorandom sequence from the group of points over an elliptic curve. This method is based on an elliptic curve (EC), a linear feedback shift register and a random ...
  • Oo, Sheinn Thawtar; Thida, Aye (ICCA, 2021-02-25)
    Figurative languages can be found in all areas of human activities, literary, discourse and conversation. Metaphor, which is one of the figurative languages, becomes a problem in natural language processing (NLP). In Myanmar ...
  • Vaish, Abhishek; Jha, Anand Sanjeev Kumar Atul Krishna (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The main area of discussion of our paper “Security of Mobile Agent” is on the host platform attacking the mobile agents. Malicious host is a system in network which can take advantage of a mobile agent. A malicious ...
  • Wadan, Christen Mohamed (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    High biomass consumptions have large social, economic and ecological blessings as well as challenges to contend with. Computing biomass determinations demand renewable and non-renewable energy fact-findings. The study aims ...
  • Hlaing, Wai Mar; Liu, Shi-Jian; Pan, Jeng-Shyang (Journal of Internet Technology(JIT), 2019-11)
    A Novel graph approach named Combined Forward and Backward Heuristic Search (CFBHS) is proposed in this paper, which can be used to solve optimization problems in areas such as transportation and network routing. There ...
  • Aung, May Thu (University of Computer Studies, Yangon, 2022-12)
    Detecting various classes of objects and measuring the distance between camera and objects are implemented in this system. The input of the system is an image or video which are captured by the camera. YOLOv5 architecture ...
  • Cherry, Hnin; Sein, Myint Myint (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    With an importance of artificial intelligence in today’s world, deep learning technology has developed very powerful in solving many problems in various fields that is included in speech recognition, natural language ...
  • Paing, Shwe Yi (University of Computer Studies, Yangon, 2022-06)
    The current ultrasonic impediment evasion robot just purposes an ultrasonic sensor during the time spent obstruction aversion, which must be tried not to accord to the decent snag evasion course. Hindrance evasion ...
  • Htike, Theingi; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Neural network classifier methods and decision trees are widely used in various pattern recognition research areas. Among them, printed character recognition still faces some issues in all languages. Myanmar sentences ...
  • Thin, Aye Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    There exist a number of problems relating to homeomorphisms and semi-homeomorphisms in generalized topological structures. In this paper, a study to reformulate the properties of semigeneralized homeomorphisms and ...
  • Ou, Shein Phyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents multi-agent system and forwards-chaining algorithm. This system intends to support the internet users who are interested in searching for the job from online processing. It hunts job depending the user’s ...
  • Wai, Su Myat Phyo; Cho, Aung (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Multi-agent system is used as a core technology in various applications, from information technology to business process automation. A comparisons agent is an agent that has access to at least one and potentially ...
  • Aye, The` Seint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    As Agents become more active and sophisticated, their implicit actions become more serious. This paper describes the use of software agents for extracting data and reserving ticket to improve the services. These agents can ...
  • Zaw, Kyaw Nyi Nyi; Phyu, Ei The (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Online auctions have become an effective approach in the buying and selling process, employed in the rapidly emerging Internet-based electronic commerce platforms. Through internet, the limitation of distance and region ...

Search Repository

Browse

My Account