Browsing by Title

Sort by: Order: Results:

  • Khine, Aye Aye (5th Annual International English Language Teaching Conference, 2019-07-22)
    Nowadays, teaching-learning process is being changed from traditional to some innovative ways by using digital technology. In previous time, teacher-centred method was used but learnerfocused teaching is now being applied ...
  • Zodingliana (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptograph is crucial to communicating medium. The use of cryptography today becomes widespread, not just in military situation but for commercial and private purposes. So the electronic messages and documents which ...
  • Htun, Win; Soe, Thi Thi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The growth of networked multimedia data such as images has complicated for authentication, copyright protection, broadcasting and integrity. Digital image watermarking is effective approach to distribute picture over the ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Tun, Amy; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Digital watermarking technology is now attracting considerable attention as one of the potential solutions for protecting copyrights of digital images. In this paper, digital color image watermarking scheme based on ...
  • Htwe, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Digital libraries are emerging technologies for document management starting, from source through storage of documents and use of the management standard such as metadata for efficient search and retrieval to delivery. ...
  • Win, May Thu; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, the security of the information exchanged is very important. In this paper, MD5 is used for computing the hash value of the message and RSA is used for signing the message and verifying the digital signature. ...
  • Mon, Hnin Yu (3rd International TESOL conference, 2018-08-25)
    Speaking skill seems to be the most difficult language skill to teach Myanmar students, probably because English is used only in the classroom. The aim of this study is to compare the results of the teaching technique ...
  • Htet, Thu Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting a secret communication. Hiding a message will most likely leave detectable traces in the cover medium. The information hiding process changes the statistical properties ...
  • Thu, Han Ni Ni Myint; Oo, Khine Khine (National Journal of Parallel and Soft Computing, 2019-03)
    Web mining techniques can use to search for web access patterns, web structures, regularity and dynamics of web contents. Web usage mining analyzes Web log files to discover user accessing patterns of Web pages. Log ...
  • Thu, Han Ni Ni Myint (University of Computer Studies, Yangon, 2019-02)
    Web mining techniques can be used to search for web access patterns, web structures, regularity and dynamics of web contents. Web usage mining analyzes Web log files to discover user accessing patterns of Web pages. Log ...
  • Hlaing, Nwe Nwe; Nyunt, Thi Thi Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    As web sites are getting more complicated, the construction of web information extraction systems becomes more troublesome and timeconsuming. A common theme is the difficulty in locating the segments of a page in which ...
  • Kyaw, Phyo Tinzar; Phyu, Sabai (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Analyzing and exploring regularities in the behavior of the web page reader is imprinted on the web server log files can improve system performance; enhance the quality and delivery of Internet information services to ...
  • Lwin, Ei Zar; Oo, Khwar Nyo (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Web mining generates web access patterns, web structures, regularity and dynamics of web contents. Association rules are used to describe what items are frequently bought together. One could also use them in web usage ...
  • San, Htet Htet; Myo, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, Web becomes a large repository for knowledge discovery. However, how to find needed and related information from the Web is a big challenge for users. As a solution, Web personalization and recommendation technique ...
  • San, Wint Khet; Tun, Zaw (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    With the rapid development of information technology, it provides possibilities for the multiple data integration architecture among applicationsin distributed environment. It involves retrieving and integration ...
  • Wai, Hsu Mon Thet; Win, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays , most of the people who may be in educational field, IT fiel d, or business field or others widely use the internet. The e learning, e mailing, eCommerce and other online techniques are used. The usage data ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Community Detection (CD) is an interesting research area in social network analysis. It becomes NP-hard problem in large network. Many researchers use heuristic algorithms to detect communities in social network. These ...
  • Han, Zin Nyein Nyein; Tun, Ei Ei Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Clustering is the process of grouping a set of physical or abstract objects into classes of similar objects is called clustering. A cluster is a collection of data objects that are similar to one another within the ...
  • OO, THANDAR (University of Computer Studies, Yangon, 2022-12)
    The major cause of accidents is due to driver’s distracted actions. Most of the car accidents involve driver distraction under different forms such as talking on the phone, texting, operating the radio, drinking and ...

Search Repository

Browse

My Account