Browsing by Title

Sort by: Order: Results:

  • Lwin, Khin Moh Moh (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software failures are now known to be a dominant source of system outages. The cost of unplanned outages is higher than the cost of planned outages. Software systems often experience aging related defects which ...
  • Paing, Aye Myat Myat; Lwin, Khin Moh Moh; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The availability of IT infrastructures is still a huge challenge nowadays. As server virtualization is used as an essential software infrastructure of various software services in IT environment and it is emerging as ...
  • Wai, Saw Yu Yu; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Computerized record linkage is increasing used in health information systems. Medical record linkage expresses the concept of collecting health care records into commutative personal file, starting with birth and ending ...
  • Thida, Aye; Shwe, Thanda (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    With the increasing popularity and adoption of IoT technology, fog computing has been used as an advancement to cloud computing. Although trust management issues in cloud have been addressed, there are still very few ...
  • Than, Zin Mar; Htway, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A multi-agent system is a collection of software agents that work in conjunction with each other. This thesis emphasizes the personalization Agent for Tourism Advisor system. The Personalization Agent retrieves the ...
  • Yi, Win Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is used the various data from Spinning and Weaving Factory (Sarlingyi). The products of factory have four types. There are 1/21 fiber, 1/32 fiber, 1/24 fiber and 1/40 fiber. In this system, the maximum profit ...
  • Nakajima, Hideharu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Corpora must be developed for realizing statistical language models; however, it is labor-intensive work and is very expensive. Often corpora resources are scant for such a domain as new language, new task, and new ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, Wireless Local Area Network (WLAN) is widely used because of mobility and ease of placement. The rapid growth in the use of wireless networks attracts the attackers as a target. Link layer is the weakness ...
  • Khaing, Phyu Phyu; Thwe, Khine Zar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The aim of this paper is to assist Buddhists and the new Buddhist students who are unfamiliar with some of the Pali words often used in the study of Buddhism. Moreover this can also assist the students of philosophy ...
  • Latt, Tin Myo; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural language processing is normally used to describe the function of computer system which analyze or synthesize spoken or written language. One area of Natural language processing is concerned with creating proofing ...
  • Win, Su Su; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To ...
  • Yu, Thanda Tin; Lynn, Khin Thidar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Apriori is an algorithm for frequent item set mining and association rule mining over transactional databases. It proceeds by identifying the frequent individual items in the database and extending them to larger and larger ...
  • Naing, Phone; Oo, Kyaw Zin; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Today’s Cryptographic Methods are based on Mathematical ideas and its complexity. Quantum Computers are getting increasing attention because of the tremendous power by harnessing the unique properties of Quantum Physics. ...
  • Kyaw, Aye Aye; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    oftware testing is an activity of finding defects during execution time for a program so that nondefect software can be got. Software testing plays a vital role in developing software that is free from bugs and defects. ...
  • Thu, Pyae Phyo; Win, Htwe Nu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The term virtual phone conversation system refers to the bidirectional Myanmar to Myanmar Speech-to-Text and Text-to-Speech translation system that runs in real-time on the mobile phones. With the used of Real-time ...
  • Aung, Yin Pa Pa; Htoo, Nay Zar Chi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptography makes secure websites and electronic safe transmission possible. For a web site to be secure all of the data transmitted between the computers where the data is kept and where it is received must be encrypted. ...
  • Hlaing, Ei Phyu; Lwin, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Many people use the internet or the web as a source of information. In an enterprise that uses the internet, a reverse proxy server is a server that acts as an intermediary between a workstation user and internet so that ...
  • Thu, Pyae Phyo; Lynn, Khin Thida (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...

Search Repository

Browse

My Account