Browsing by Title

Sort by: Order: Results:

  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, Wireless Local Area Network (WLAN) is widely used because of mobility and ease of placement. The rapid growth in the use of wireless networks attracts the attackers as a target. Link layer is the weakness ...
  • Khaing, Phyu Phyu; Thwe, Khine Zar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The aim of this paper is to assist Buddhists and the new Buddhist students who are unfamiliar with some of the Pali words often used in the study of Buddhism. Moreover this can also assist the students of philosophy ...
  • Latt, Tin Myo; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural language processing is normally used to describe the function of computer system which analyze or synthesize spoken or written language. One area of Natural language processing is concerned with creating proofing ...
  • Win, Su Su; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To ...
  • Yu, Thanda Tin; Lynn, Khin Thidar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Apriori is an algorithm for frequent item set mining and association rule mining over transactional databases. It proceeds by identifying the frequent individual items in the database and extending them to larger and larger ...
  • Naing, Phone; Oo, Kyaw Zin; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Today’s Cryptographic Methods are based on Mathematical ideas and its complexity. Quantum Computers are getting increasing attention because of the tremendous power by harnessing the unique properties of Quantum Physics. ...
  • Kyaw, Aye Aye; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    oftware testing is an activity of finding defects during execution time for a program so that nondefect software can be got. Software testing plays a vital role in developing software that is free from bugs and defects. ...
  • Thu, Pyae Phyo; Win, Htwe Nu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The term virtual phone conversation system refers to the bidirectional Myanmar to Myanmar Speech-to-Text and Text-to-Speech translation system that runs in real-time on the mobile phones. With the used of Real-time ...
  • Aung, Yin Pa Pa; Htoo, Nay Zar Chi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptography makes secure websites and electronic safe transmission possible. For a web site to be secure all of the data transmitted between the computers where the data is kept and where it is received must be encrypted. ...
  • Hlaing, Ei Phyu; Lwin, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Many people use the internet or the web as a source of information. In an enterprise that uses the internet, a reverse proxy server is a server that acts as an intermediary between a workstation user and internet so that ...
  • Thu, Pyae Phyo; Lynn, Khin Thida (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Swe, Khin Thet Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents how to get data integrity and authentication in receiver. Signing process is performed in sender and verifying process is performed in receiver. In signing process, sender computes hash value of ...
  • Oo, Aung Nway (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Proxy blind signature, which combines the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original ...
  • Swe, Minn; Das, Partha Pratim; Htay, Myat Thet Lyar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Optimization is ubiquitous, from industry to engineering design, from scheduling your daily routine to your holiday. In many large organizations, from governments to private companies, management of transferring staffs ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud computing is an emerging computing paradigm in which applications, data and IT resources are provided as a service to users over the Internet. One kind of services that can be offered through the cloud is Software ...
  • Zar, Myat Thu; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Building public route transportation system is the key technology for urban areas. Most of citizens in Yangon area make use of public transportation such as bus, taxi, rail and so on. In this system, A* algorithm is used ...
  • Phyo, Su Hlaing (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Replication is important in distributed environment. Replication provides users with their own local copies of data. These local, updatable data copies can support increased localized processing, reduced network traffic ...
  • OO, MAY ZIN (University of Computer Studies, Yangon, 2023-01)
    In recent years, with the advancement of high speed communication networks, multimedia applications which consists of a collection of multiple media such as text, graphics, images, sound, and video became popular. Due ...
  • Thazin, Nwe (Unversity of Computer Studies, Yangon, 2019-11)
    Quality of Service (QoS) is the overall performance of a computer network, particularly the performance seen by the users of the network. By managing the delay, bandwidth, and packet loss parameters, it allows us to ...

Search Repository

Browse

My Account