Browsing by Title

Sort by: Order: Results:

  • Htay, Kyawt Kyawt; Win, Khin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, intends to enable the rapid deployment of existing databases on the Web and expanding the potential user audience of the databases. The relational database metadata is applied to generate dynamically from ...
  • Thant, Yin Mon; Lwin, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, a website is much more than just a beautiful graphic design on screen; it is an important tool to provide the necessary information to the visitors. The management of web content and information plays an importance ...
  • Wai, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A data warehouse is a redundant collection of data replicated from several possibly distributed and loosely coupled source databases organized to answer On-Line Analytical Processing (OLAP) queries. OLAP queries are typically ...
  • Tun, May Thet (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Credit card classification is a system for credit card users which is used to assign either a "good credit card ",which is likely to repay financial obligation, or a "bad credit card ", which has high possibility of ...
  • Khine, Aye Aye; Khin, Hnin Wint (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays, data stream mining is a very hot and high attention research field due to the real-time industrial applications from different sources are generating amount of data continuously as the streaming style. To ...
  • Mo, Hsu Myat; Nwet, Khin Thandar; Soe, Khin Mar (The Tenth International Conference on Genetic and Evolutionary Computing (ICGEC 2016), 2016-10-21)
    Named Entity recognition (NER) is a subtask of information extraction and information retrieval that automatically identify proper nouns in texts and classify into predefined categories of name types. This paper introduces ...
  • Aung, Yunn Mee Mee (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Today many business and factory want to get maximum profit for their products, so they use many optimum resource allocation methods for decision variables or slack variables. (E .g – By using Simplex method, Big –M method, ...
  • Kyaw, Win Thuzar; SAGISAKA, Yoshinori (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-16)
    Following the successful findings of high correlations between speech and color such as F0 and Value, Loudness and Saturation and Spectrum and Hue, we analyzed the correlations between voice source characteristics and ...
  • Nwe, Thazin; Yee, Tin Tin; Htoon, Ei Chaw (ICCA, 2021-02-25)
    The communication between data accessibility and consistency becomes a challenge of replica selection for a Key-Value Storage (KVS). Applying a fixed replica selection policy in numerous data centers may decrease the ...
  • Win, Kyaw Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Cloud computing technology becomes most popular in modern technology environment. Users store their data on third-party storage, cloud storage provider. In this case, security concerns arise to protect their stored ...
  • Thein, Myo Min; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today. More and more information has been transmitted over the World. The information is not only text, but also audio, image, and other multimedia Images have been widely used in our daily life. This paper presents on ...
  • Zaw, Sai Maung Maung (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper is presented as hybrid protocol for MAC layer in Wireless Sensor Networks (WSNs). It combines contention and schedule-based methods. Time slots are assigned at deployment and reassigned when significant ...
  • Yee, Thiri The` Wut; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Smartphones are more and more gaining popularity, creating novel application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile applications ...
  • Myint, Nan Khin Pyone; Khaing, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In Natural Language Processing (NLP), Machine translation (MT) is the application of computers to the task of translating texts from one natural language to another. In Natural Languages of Myanmar and Pa-Oh language, ...
  • Khine, Aye Aye; Mon, Khine Yin (4th Annual International English Language Teaching Conference (2018), 2018-06)
    It is no doubt that schools and universities cannot exist a curriculum. An effective curriculum provides a quality education. In general, a curriculum should meet the needs of students in which the demands of the current ...
  • Win, Yamone Hla (University of Computer Studies, Yangon, 2019-02)
    In robot vision systems, three-dimensional data reconstruction becomes popular to be used in new research procedures. There are different types of depth sensors in industrial applications. These sensors are easy to access ...
  • HTET, NAN EI PHYO (University of Computer Studies, Yangon, 2022-12)
    The term “customer churn” is used to indicate those customers who are about to leave for a competitor or end their subscription. Customer churn or customer attrition has become an important issue for organizations ...
  • Cho, Mya Pwint; Han, Ei Ei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Customer Relationship Management (CRM) has been the important part of enterprise decision and management and Data mining technology provides a good support for the implementation of CRM. This system indents to classify the ...
  • Latt, Kyaw Zin; Ko, Lin Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication ...
  • Moe, Hla Hla; Htun, Moe Sanda (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Within the past few years, a large variety of online stores has been started in cyberspace and people face the problems to get some things which they really want or need. Recommender systems help them to solve these problems. ...

Search Repository

Browse

My Account