Browsing by Title

Sort by: Order: Results:

  • Oo, Mi Khine; Khaing, Myo Kay (14th International Conference on Computer Applications (ICCA 2016), Yangon, MYANMAR, 2016-02)
    Under the explosive increase of global data, the term Big data is mainly used to describe enormous datasets. With the availability of increasingly large quantities of digital information, it is becoming more difficult ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only end users applications ...
  • Hlaing, Wai Mar; Sein, Myint Myint (The Seventh International Conference on Science and Engineering 2016, (ICSE 2016), 2016-12-10)
    Nowadays, people widespread use of smartphones and ubiquitous devices for map based services. As the transport network is complicated and massive, people may be confused to reach the desired location after finding ...
  • Lwin, Khin Moe; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper proposed an approach of searching the optimal bus-routes based on data mining technology called Frequent Subgraph Mining (FSM).FSM is an important task for exploratory data analysis on graph data. Many approaches ...
  • Yar, Kay Thi; Tun, Khin Mar Lar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for ...
  • Hein, Nay Zaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Combinatorial reasoning underlines all analysis of computer systems. It plays a similar role in discrete operational research problems. Two of the most basic mathematical aspects of computer science concern the speed ...
  • Nwet, Khin Thandar; Oo, Nyo Nyet Nyet (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In Myanmar language, the spoken language may be different with the written language in many cases. In Myanmar, the words are the same phonetically in pronunciations with different spellings such as ကုနရန်, ယန်ဂုန်, ...
  • Nwe, Win Hay Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Conventional database query methods are inadequate to extract useful information from huge data banks. Cluster analysis is one of the major data analysis methods, and process of grouping a set of physical or abstract ...
  • Aye, Nang Yupar; Aung, Nang Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper studies Searching Methods. Among the searching methods, this system emphasized the hill climbing. Hill climbing tries to expand the node closet to the goal; it evaluates nodes by using heuristics method. This ...
  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Moe, Hlwan (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure exchange of secret messages over public channel plays a very important role of secret communication. The use of Steganography is much less threatening than the use of cryptography because after encoding stego ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...
  • Than, Myo Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In computer and network systems, the private access systems use cryptosystems that provide to certain and ensure data of information that are authentic and secure. This paper will develop the secure bank transaction ...
  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Aung, Theingi Nwe; Hlaing, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    With the rapid advances in security threads, more reliable security techniques have become the business necessity. The security services must assure that the communication is not refered with in such a way that the party ...
  • Wun, Ei Mon Thu; Phyu, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper describes secure transaction of credit card system. The credit card requires the provision of purchaser’s credit card details to the service provider for goods and services purchased over the network. Therefore, ...
  • Hlaing, Pa Pa (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Data centers have become the nextgeneration computing platforms for enterprises and Internet users. This is primarily due to the economic and technical advantages of resource sharing in data centers. By sharing ...
  • Than, Shwe Sin Myat; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...
  • Nwe, Yie Yie (University of Computer Studies, Yangon, 2022-09)
    Database security is the system, processes, and procedures that protect a database from unintended activity. The protection of data storage is a challenging and formidable task and so the user data should be protected ...

Search Repository

Browse

My Account