Browsing by Title

Sort by: Order: Results:

  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Khaing, Myo; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    A novel metric that integrates the correlation and reliability information between each feature and each class obtained from Multiple Correspondence Analysis (MCA) is currently the popular solution to score the features ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • Swe, Myo Myo; Myo, Nyein Nyein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social networking sites have turned out to be extremely well known as of late. Most internet users utilize them to discover new companions, refreshes their current companions with their most recent feelings and thoughts. ...
  • Win, Chaw Su; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Web pages consist of both informative and non-informative content for the users. Web Page Indexing System, Web Page Classification and Clustering System and Web Information Extraction System that help the users to support ...
  • Khine, Su Mon; Nyunt, Thi Thi Soe; Maw, Aye Aye; Min, Soe Soe (Myanmar Universities' Research Conference, 2019-05-25)
    The use of cooperative and active learning approach is an important role for education system. Although the cooperative technique, Jigsaw have been accepted and applied in many countries’ educational environment over ...
  • San, Cho Cho (University of Computer Studies, Yangon, 2019-10)
    Each and every day, malicious software writers continue to create new variants, new innovation, new infection, and more obfuscated malware by using packing and encrypting techniques. Malicious software classification and ...
  • Win, Sandar; Thein, Thin Lai Lai (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    The recognition of 3D human pose from 2D joint location is fundamental to numerous vision issues in analysis of video sequences. Various methods using with skeletal model have been described in past decades, but there ...
  • Oo, Wint War; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. The emergence of real-time applications ...
  • Hlaing, Khin Nilar; Khine, May Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The timely procurement and delivery of materials / equipment to yard, site and assembly locations requires a huge team effort and is paramount for the successful work done for shipyards and construction sites.The ERRP ...
  • Su, Hla Myo; Maw, Aung Htein (ICCA, 2021-02-25)
    Video streaming exceeds all other traffic types on the internet. Now, it occupies a significant portion of total internet traffic. The transmission mechanism used by the video stream affects not only network traffic but ...
  • Tun, Aye Myint; Min, Myat Myat (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    The decision support system (DSS) is an interactive system to support decision making. We intend to build the system as a decision support system using Analytical hierarchy Process (AHP) approach. In the proposed system, ...
  • Aung, Thinzar; Myint, Zin Thu Thu (ICCA, 2021-02-25)
    Nowadays, many people use the internet for more than one purposes. Among these purposes, they mostly apply the web application which is one of the internet usage technologies. A web application is composed of a web server ...
  • Win, Khine Zar Ne; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The rapid growth of aspect-oriented applications increases the need to evaluate these applications. In the past, the software attributes have been tried to subjectively and objectively evaluate for the object-oriented ...
  • San, Ni Ni; Moe, Myat Myat (2nd Conference on Computer Applications and Research (CCAR 2018), 2018)
    This paper presents a theoretical and practical approach to the effective communication in teaching and motivation of the students in learning environment. This study based on some under graduate students from University ...
  • Myint, Aye Sandar; Khine, May Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    XML document are frequently used in application such as business transaction and medical record involving sensitive information. Typically, parts of xml documents should be visible to users depending on their roles. ...
  • Aye, Hnin Mya; Zaw, Sai Maung Maung (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Action recognition has become an important research topic in the computer vision area. This paper presents an efficient action recognition approach based on salient object detection. Recently, many features were directly ...
  • Htwe, Thanda; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Most of the Web page typically contains clutter unlike conventional data or text. It usually has such noise data as navigation panels, copyright and privacy notices, and advertisement. These noise data can seriously ...
  • Aung, Su Nandar; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Spatial keyword search on spatial database has been well studied for years due to its importance to commercial search engines.Specially, a spatial keyword query takes a user location and user-supplied keywords as ...

Search Repository

Browse

My Account