Browsing by Title

Sort by: Order: Results:

  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The RDF (Resource Description Framework) model has attracted the attention of the database community and many researchers have proposed different solutions to store and query RDF data efficiently. This paper proposes ...
  • Baral, Amit Raj; Koshiba, Takeshi (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Increasing dependency of data availability and the fear of losing the private information during com- munication motivate the need of privacy protection. One of the common problems occurs when two par- ties need to ...
  • Latt, Win Zaw (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Today, data migration is important to the organizations to transform the data sources of old systems to the new systems. Most companies do data migration to update their systems. Data migration is the process of moving ...
  • Aung, Zayar; Sergeevich, Mihailov Ilya; Aung, Ye Thu (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The purpose of this work is to create a learning algorithm which is based on accumulated historical data on previously drilled wells. Wells will forecast an emergency accompanied by drilling. Such a decision support ...
  • Myint, Khaing; Oo, Win Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data preprocessing is an important step in the knowledge discover process and quality decisions such as, real-world data which tend to be incomplete, noisy and inconsistent data. The system uses the discretization and ...
  • Aye, Kyar Nyo; Thein, Thandar (Twelfth International Conference on Computer Applications (ICCA 2014), 2014-02-17)
    Data rebalancing is one of the most interesting research areas in distributed file systems. In Gluster file system, data among the storage servers are rebalanced after adding a new storage server to the Gluster storage ...
  • Thant, Phyu Phyu (University of Computer Studies, Yangon, 2022-04)
    This system implements data recovery in cloud computing by using Enriched Genetic Algorithm (EGA). Cloud computing provides various kinds of services to its users. Storage-as-a-service is one of the services provided ...
  • Aye, Swe Zin; Zaw, Ei Phyu (National Journal of Parallel and Soft Computing, 2019-03)
    Transaction Processing System (TPS) plays a main role to handle data transaction in the business world. In TPS, there are three main functions: data loss prevention, data locking and deadlock detection and resolution. ...
  • Nwe, Nann Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data replication is a key technology in distributed systems that enable higher availability and performance. Data replication consists of maintaining multiple copies of data, called replicas, on separate computers. ...
  • Phyu, Win Lai Lai (University of Computer Studies, Yangon, 2024-03)
    This dissertation aims to investigate the data augmenting and scrutinizing methods in developing a speech dataset for text independent Burmese speaker identification in open-set case which means the test speaker may ...
  • Han, Hane Thu; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The role of cryptograph is important for data security. Many cryptographic techniques can be used to keep security of sensitive data. Information is an arm of Military as well as the security of information is it’s life. ...
  • Nwe, Aye Aye; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the ...
  • Swe, Myat Myat; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, technology is moving very fast and is growing demand for the security of data transferring and data collections over the network. To solve the security problems, Cryptography is very useful mechanism not only for ...
  • Aung, Hsu Mon Lei; Win, Aye Sandar; Hlaing, Swe Zin (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, it is clear that a huge data storage is needed to store very large amount of textual unstructured data. Compression is an effective technique to less data storage space. Most unstructured data are random or ...
  • Pann, Yin Nyein; Kyaw, Nu Yin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    All over the world, as IT technology is increasingly, important services are also becoming more convenient. As a result of it; most of the enterprises are using database system. A distributed database system manages and ...
  • Aung, Han Su; Latt, Yin Ko (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data warehouses collect information from remote sources into a single database. Data Warehouse is created for speed up queries by reducing the volume of data to be scanned. Data warehousing and on line analytical ...
  • Nyeint, Khin Aye; Soe, Khin Mar (National Journal of Parallel and Soft Computing, 2019-03)
    The banking industry has undergone a major change in recent years. Global competition has forced the industry to be more agile and customer focused in all its services. Banks can no longer function in isolation, but ...
  • Moe, Swe Zin; Aye, Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The need to protect database, would be an every growing one especially so in this age of e-commerce. Many conventional database security systems are bugged with holes that can be used by attackers to penetrate the database. ...
  • Khaing, Myint Myint; Oo, Hlaing Thida (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Genetic Algorithm (GA) and fitness function equation is write in basic language and embedded in Microcontroller. The fitness value from function is assign as the duty cycle of the DC motor. In this system 6 bit chromosome ...
  • Myint, May Phone; Win, Thandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital image watermarking is a method trying to embed small image inside a large original image. The original image will be converted into frequency domain to obtain the Discrete Cosine Transform (DCT) matrices from its ...

Search Repository

Browse

My Account