Browsing by Title

Sort by: Order: Results:

  • Tun, Kaythi; Myo, Nyein Nyein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Bayseian Classifier can predict class membership probabilities, such as the probability that a given sample belongs to a particular class. They are Powerful tools for solving classification problems in a vareity of domains. ...
  • Htun, Zin Zin; Zan, Thu Thu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    At present, there are many diseases at each case so that it is difficult to get a correct diagnosis. And, consultation with a specialist is one of the solutions in clinical problem, but frequently medical expert opinion ...
  • Htut, May Zin; Win, Thin Zar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining is the process of discovering useful information underlying the data. Powerful techniques are needed to extract patterns from large data because traditional statistical tools are efficient enough any more. ...
  • Aung, Thandar; Zaw, Wint Thida (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Case Based Reasoning methodology presents a foundation for a new technology of building intelligent computer-aided diagnoses systems. This technology directly addresses the problems found in Artificial Intelligence (AI) ...
  • Latt, Nyi Nyi; Sann, Khin Moe (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Data mining aims to discover novel, interesting and useful knowledge and patterns from databases. Data Classification is the process of building a model from available data called the training data set and classifying ...
  • Min, Zay Yar; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the technology grows rapidly, many people take a great interest in computer and then computerbased methods are increasingly used to improve the quality of the medical services. Human experts in medical field ...
  • Aung, Thet Thet; Min, Myat Myat (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Rice cultivation is the major food crop enterprise in Myanmar. Numerous disease of rice has been found in rice field cause considerable crop losses field. Diseases control and treatment are required in rice field. ...
  • Naing, Soe Kalayar; Myo, Nyein Nyein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Decision tree learning algorithm has been successfully using in data minng for training data set. In this system, the main task performed is using inductive methods to the given values of attributes of an unkown object to ...
  • Chit, Nay Chi; Oo, May Khaing (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Computers have become an indispensable tool in the Health Care Industry. As technology grows rapidly, many people take great interest in computer and then computer based methods are used to improve the quality of the medical ...
  • Naing, Tint Htoo; Nge, Mi Mi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-base Reasoning (CBR) is an artificial intelligent approach to learn and solve the problem emphasizes the role of prior experience. Case-base reasoning methods have to deal with the current problem to identify the ...
  • Khine, Aye Aye (5th Annual International English Language Teaching Conference, 2019-07-22)
    Nowadays, teaching-learning process is being changed from traditional to some innovative ways by using digital technology. In previous time, teacher-centred method was used but learnerfocused teaching is now being applied ...
  • Zodingliana (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptograph is crucial to communicating medium. The use of cryptography today becomes widespread, not just in military situation but for commercial and private purposes. So the electronic messages and documents which ...
  • Htun, Win; Soe, Thi Thi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The growth of networked multimedia data such as images has complicated for authentication, copyright protection, broadcasting and integrity. Digital image watermarking is effective approach to distribute picture over the ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Tun, Amy; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Digital watermarking technology is now attracting considerable attention as one of the potential solutions for protecting copyrights of digital images. In this paper, digital color image watermarking scheme based on ...
  • Htwe, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Digital libraries are emerging technologies for document management starting, from source through storage of documents and use of the management standard such as metadata for efficient search and retrieval to delivery. ...
  • Win, May Thu; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, the security of the information exchanged is very important. In this paper, MD5 is used for computing the hash value of the message and RSA is used for signing the message and verifying the digital signature. ...
  • Mon, Hnin Yu (3rd International TESOL conference, 2018-08-25)
    Speaking skill seems to be the most difficult language skill to teach Myanmar students, probably because English is used only in the classroom. The aim of this study is to compare the results of the teaching technique ...
  • Htet, Thu Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting a secret communication. Hiding a message will most likely leave detectable traces in the cover medium. The information hiding process changes the statistical properties ...
  • Thu, Han Ni Ni Myint; Oo, Khine Khine (National Journal of Parallel and Soft Computing, 2019-03)
    Web mining techniques can use to search for web access patterns, web structures, regularity and dynamics of web contents. Web usage mining analyzes Web log files to discover user accessing patterns of Web pages. Log ...

Search Repository

Browse

My Account