Browsing by Title

Sort by: Order: Results:

  • Thant, Win Win; Khaing, Sandar; Mon, Ei Ei (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Over the years, social media sites have become an important role of communication and a source of the tremendous amount of real-time data of images, videos, etc. YouTube is likely the most popular of them, with millions ...
  • Myat, Soe Myint; Soe, Than Naing (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    An effective IT solution is required for the administrative processes which is the core of university. The tamper resistance, transparency and auditability for university management data are very important to avoid the ...
  • Win, Swe Swe; Nwe, San San (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In business environment, banking system plays one of the main roles in buying and selling transactions. A transaction is a logical unit of work. A transaction processing system (TPS) is a system that monitors transaction ...
  • Kyaw, Htet Htet; Nwe, Khine Moe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A transaction is a logical unit of work. Transaction Processing Systems (TPS) are the heart of the business operations today. A TPS may fail for many reason such as system failure, human errors, hardware failure, ...
  • Win, Phyu Phyu (2022-09)
    Online banking system has created an enormous impact on IT, Individuals, and networking worlds. Online banking systems and its exclusive architecture have numerous features and advantages over traditional banking system. ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Preventive maintenance combined with disaster recovery planning will help to minimize the hardware and software problems if disaster occurs. Disaster recovery processes involve unplanned interruption of services. ...
  • Thein, Yadana; Htike, Theingi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar printed character s . This paper involves three important ...
  • Aung, Nwe Mon Mon; Moe, Myint Myint (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference ...
  • Mon, Ei Ei; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is one of today’s most attractive technology areas due to its many advantages like Highly scalable, on-demand, web-accessed IT resources with major cost / cash and flexibility. In this paper, the ...
  • Kyaw, Cho Cho (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy protection play a vital role to build up the cloud computing environment. This system intends to implement secure cloud privacy system using Identity based Encryption (IBE) and Identity based Signature (IBS) ...
  • Htoo, Chit Kyin; Sein, Myint Myint (ICCA, 2021-02-25)
    Fall is a critical danger for a person because he/she can loss any recontroled and stable posture and can face to any associated injuries without any caregiver. Therefore, automatic fall recognition systems have been ...
  • Nwey, Zun Nyein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy information retrieval (PIR) can be viewed as a service between a user and a database. Private retrieval of public data is critical in these days when a client wants to query a public data service without expressing ...
  • Lwin, Khin Moh Moh (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software failures are now known to be a dominant source of system outages. The cost of unplanned outages is higher than the cost of planned outages. Software systems often experience aging related defects which ...
  • Paing, Aye Myat Myat; Lwin, Khin Moh Moh; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The availability of IT infrastructures is still a huge challenge nowadays. As server virtualization is used as an essential software infrastructure of various software services in IT environment and it is emerging as ...
  • Wai, Saw Yu Yu; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Computerized record linkage is increasing used in health information systems. Medical record linkage expresses the concept of collecting health care records into commutative personal file, starting with birth and ending ...
  • Thida, Aye; Shwe, Thanda (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    With the increasing popularity and adoption of IoT technology, fog computing has been used as an advancement to cloud computing. Although trust management issues in cloud have been addressed, there are still very few ...
  • Than, Zin Mar; Htway, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A multi-agent system is a collection of software agents that work in conjunction with each other. This thesis emphasizes the personalization Agent for Tourism Advisor system. The Personalization Agent retrieves the ...
  • Yi, Win Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is used the various data from Spinning and Weaving Factory (Sarlingyi). The products of factory have four types. There are 1/21 fiber, 1/32 fiber, 1/24 fiber and 1/40 fiber. In this system, the maximum profit ...
  • Nakajima, Hideharu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Corpora must be developed for realizing statistical language models; however, it is labor-intensive work and is very expensive. Often corpora resources are scant for such a domain as new language, new task, and new ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...

Search Repository

Browse

My Account