Browsing by Title

Sort by: Order: Results:

  • Aye, Thae Nu (University of Computer Studies, Yangon, 2023-01)
    There is a vast amount of duplicated or redundant data in storage systems. The existing data deduplication attempted to reduce the storage spaces in file-level, sub file-level data storage in terms of byte-level. There ...
  • Thwel, Tin Thein; Thein, Ni Lar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    As the amount of storage utilization become larger and larger, people have been tried to find out the efficient ways to safe storage space. The single instance storage or data deduplication becomes vague in storage ...
  • Hlaing, Htike Ayar; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the current computing community, secure data transfer is limited due to its attack made on data communication. Solutions which came to the rescue are cryptography and steganography. Cryptography is often used in ...
  • Win, Ngu War; Aye, Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Lwin, Yupar Kyaw; Thida, Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A data warehouse uses multiple materialized views to efficiently process a given set of queries. Materialized views selection is one of the crucial decisions in designing a data warehouse for optimal efficiency. The idea ...
  • Khin, KayKay Thi Wut Hmone; Oo, Lwin Lwin (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today, people use widely computer networks to communicate from one place to another. When people use computers, they will need necessary to protect the information and to thwart the hackers. So, people interconnect their ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Cloud Computing is one of the converging technology trends in Information Technology which can pave the way to optimized computing solution. Several research issues exist in these converging technologies. Among them, ...
  • Win, Swe Zin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Today, many business applications continue the ongoing creation of separated data stores; data mining often requires data integration for those data. This process becomes significant in a variety of situations both ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The RDF (Resource Description Framework) model has attracted the attention of the database community and many researchers have proposed different solutions to store and query RDF data efficiently. This paper proposes ...
  • Baral, Amit Raj; Koshiba, Takeshi (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Increasing dependency of data availability and the fear of losing the private information during com- munication motivate the need of privacy protection. One of the common problems occurs when two par- ties need to ...
  • Latt, Win Zaw (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Today, data migration is important to the organizations to transform the data sources of old systems to the new systems. Most companies do data migration to update their systems. Data migration is the process of moving ...
  • Aung, Zayar; Sergeevich, Mihailov Ilya; Aung, Ye Thu (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The purpose of this work is to create a learning algorithm which is based on accumulated historical data on previously drilled wells. Wells will forecast an emergency accompanied by drilling. Such a decision support ...
  • Myint, Khaing; Oo, Win Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data preprocessing is an important step in the knowledge discover process and quality decisions such as, real-world data which tend to be incomplete, noisy and inconsistent data. The system uses the discretization and ...
  • Aye, Kyar Nyo; Thein, Thandar (Twelfth International Conference on Computer Applications (ICCA 2014), 2014-02-17)
    Data rebalancing is one of the most interesting research areas in distributed file systems. In Gluster file system, data among the storage servers are rebalanced after adding a new storage server to the Gluster storage ...
  • Thant, Phyu Phyu (University of Computer Studies, Yangon, 2022-04)
    This system implements data recovery in cloud computing by using Enriched Genetic Algorithm (EGA). Cloud computing provides various kinds of services to its users. Storage-as-a-service is one of the services provided ...
  • Aye, Swe Zin; Zaw, Ei Phyu (National Journal of Parallel and Soft Computing, 2019-03)
    Transaction Processing System (TPS) plays a main role to handle data transaction in the business world. In TPS, there are three main functions: data loss prevention, data locking and deadlock detection and resolution. ...
  • Nwe, Nann Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data replication is a key technology in distributed systems that enable higher availability and performance. Data replication consists of maintaining multiple copies of data, called replicas, on separate computers. ...
  • Phyu, Win Lai Lai (University of Computer Studies, Yangon, 2024-03)
    This dissertation aims to investigate the data augmenting and scrutinizing methods in developing a speech dataset for text independent Burmese speaker identification in open-set case which means the test speaker may ...
  • Han, Hane Thu; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The role of cryptograph is important for data security. Many cryptographic techniques can be used to keep security of sensitive data. Information is an arm of Military as well as the security of information is it’s life. ...

Search Repository

Browse

My Account