Browsing by Title

Sort by: Order: Results:

  • kyaw, Mya Thidar; Soe, Kyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms ...
  • Oo, Myat Cho Mon; Thein, Thandar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Many real world areas from different sources generate the big data with large volume of high velocity, complex and variable data. Big data becomes a challenge when they are difficult to process and extract knowledge ...
  • Myo, Zin Mar; Mon, Myat Thida (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Long Term Evolution(LTE)can support multimedia services.To guarantee the different requirements of the different services, packet scheduler plays an important role in LTE. Especially, the additional challenges are ...
  • Mar, Yi Yi; Maw, Aung Htein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Distributed Hash Table (DHT) is a promising approach for building a large data management platform. But it cannot support complex query processing due to its one-dimensional index structure. Complex query processing ...
  • Aung, Thazin; Tun, Ei Ei Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Steganographic techniques allow one party to communicate information to another without a third party knowing that the communication is occuring. Steganography works by replacing bits of useless or unused data in regular ...
  • Phyo, Zin Mar; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Mobile Ad hoc Network (MANET) is a collection of mobile devices and is selfconfiguring, dynamically changing, multi-hop wireless network which forms a communication network via multi hop wireless network connection, ...
  • Soe, Nwe Nwe; Htay, Win (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Neural network ensemble techniques have been shown to be very accurate classification techniques. However, in some real-life applications, a number of classifiers required to achieve a reasonable accuracy is enormously ...
  • Hlaing, Nwe Ni; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Spam is a key problem in electronic communication, including large-scale email systems. Classification of spam emails is a significant operation in email system. The efficiency of this process is determined by many ...
  • Khaing (ICCA, 2021-02-25)
    An Enterprise Resource Planning (ERP) application was used predominately in manufacturing sector and hardly used in nonprofit organizations. Using ERP systems in nonprofit organizations has special features and unique ...
  • Myint, Moe Moe; Kyu, Khin Kyu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Image information is routinely used in many applications. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays an important role in protecting ...
  • Oo, Nandar Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Myanmar language input method editor (IME) is widely used in embedded system of today Android portable devices such as mobile phones, tablets and e-books readers etc. as an important part of human-computer ...
  • Win, Kyaw San; Kyu, Khin Kyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. ...
  • Myint, Theint Zarni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent research has demonstrated the strong performance of hidden Markov models (HMM) applied to information extraction that the text of populating database slots with corresponding phrases from text documents. Hidden ...
  • Tin, Hlaing May (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Recently, most IT organizations are transforming their data centers to smaller virtualized ones with the help of server virtualization. In virtualized servers, multiple applications are consolidated into a physical server ...
  • Su, Hla Myo; Maw, Aung Htein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Video streaming is becoming the most popular content delivery mechanism for media services. Multiple video streams will compete for bandwidth, thus leading to degrade performance and impacting the received quality of ...
  • Tun, Thazin; Wai, Khaing Khaing; Khaing, Myint Soe (ICCA, 2021-02-25)
    Extracting valuable information from data is a challenging task. Many times, because of massive, redundant, incorrect and noisy outcomes, an analyst will end up with an incorrect classifier. It can also be due to misinterpreting ...
  • Lee, Junhyuk; Moon, Hichan (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In many Orthogonal Frequency Division Multiplexing (OFDM)systems, pilots are periodically transmitted for channel estimation. In this paper, we investigate a simple noise power estimation algorithm based on the time-domain ...
  • Soe, Nang Kham; Yee, Tin Tin; Htoon, Ei Chaw (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Apache Hadoop is an open-source software framework for distributed storage and distributed processing of very large data sets on computer clusters built from commodity hardware. The Hadoop Distributed File System (HDFS) ...
  • Win, Htet Htet; Nway, Zon Nyein (National Journal of Parallel and Soft Computing, 2019-03)
    Android applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...
  • Win, Htet Htet (University of Computer Studies, Yangon, 2019-01)
    Information applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...

Search Repository

Browse

My Account