Browsing by Title

Sort by: Order: Results:

  • Thwin, Mie Mie Thet; Quah, Tong Seng (Proceedings of the First International Conference on Information Technology and Applications (ICITA 2002), 2002)
    In this paper, we explore the behaviour of neural network in predicting software readiness. Our neural network model aims to predict the number of faults (including objectoriented faults) of a software under development. ...
  • Zu, Chan Myae Myint (University of Computer Studies, Yangon, 2022-06)
    Nowadays, the education system has been changed from teacher centered approach to learner-centered approach. Thus, students’ related features need to analyze to predict students’ academic performance to provide the ...
  • Lin, May Phyo Wai; Oo, Khine Khine (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The goal of the proposed system is to derive models for forecasting the final price of ongoing auction. The forecasting task is important not only to the participants of an auction who compete against each other for the ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (2014-02-17)
    The high values of vehicles, the inadequate infrastructure cause traffic congestion. Congested roads can be avoided by determining the travel-time for a particular road ahead of time. Traffic prediction and travel time ...
  • Thinzar, Cho; Aye, Nyein (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    In the field of natural disaster management, storm detection, forecasting the weather condition and change detection are occupied as essential role. The storm direction detection is provided to manage and to prevent ...
  • Thinzar, Cho; Aye, Nyein (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In the field of natural disaster management, storm detection, forecasting the weather condition and change detection are occupied as essential role. The storm direction detection is provided to manage and to prevent ...
  • Phyu, Poe Ei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Neural Network technologies are applied in many fields. Neural Networks (NN) rely on the inner structure of available data sets rather than on comprehension of the modeled processes between inputs and outputs. ...
  • Khine, Kyi Lai Lai (University of Computer Studies, Yangon, 2019-10)
    Nowadays, data is extremely growing very fast to become “BIG DATA”, any voluminous amount of structured, semi-structured and unstructured data, which has high potential to be mined for valuable information in decision ...
  • Myint, San Hlaing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualized server environment, various services are revealed to high rates of incoming requests. The servers may become overloaded during temporary traffic peaks when more requests arrive than the server is considered ...
  • Maung, Tin; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents system architecture of a Context and Preference-Aware Location-based Services system (CPALBS, for short), that delivers personalized services to its customers based on the user preference query. ...
  • Thant, Win Win; Khaing, Sandar; Mon, Ei Ei (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Over the years, social media sites have become an important role of communication and a source of the tremendous amount of real-time data of images, videos, etc. YouTube is likely the most popular of them, with millions ...
  • Myat, Soe Myint; Soe, Than Naing (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    An effective IT solution is required for the administrative processes which is the core of university. The tamper resistance, transparency and auditability for university management data are very important to avoid the ...
  • Win, Swe Swe; Nwe, San San (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In business environment, banking system plays one of the main roles in buying and selling transactions. A transaction is a logical unit of work. A transaction processing system (TPS) is a system that monitors transaction ...
  • Kyaw, Htet Htet; Nwe, Khine Moe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A transaction is a logical unit of work. Transaction Processing Systems (TPS) are the heart of the business operations today. A TPS may fail for many reason such as system failure, human errors, hardware failure, ...
  • Win, Phyu Phyu (2022-09)
    Online banking system has created an enormous impact on IT, Individuals, and networking worlds. Online banking systems and its exclusive architecture have numerous features and advantages over traditional banking system. ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Preventive maintenance combined with disaster recovery planning will help to minimize the hardware and software problems if disaster occurs. Disaster recovery processes involve unplanned interruption of services. ...
  • Thein, Yadana; Htike, Theingi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar printed character s . This paper involves three important ...
  • Aung, Nwe Mon Mon; Moe, Myint Myint (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference ...
  • Mon, Ei Ei; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is one of today’s most attractive technology areas due to its many advantages like Highly scalable, on-demand, web-accessed IT resources with major cost / cash and flexibility. In this paper, the ...
  • Kyaw, Cho Cho (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy protection play a vital role to build up the cloud computing environment. This system intends to implement secure cloud privacy system using Identity based Encryption (IBE) and Identity based Signature (IBS) ...

Search Repository

Browse

My Account