Browsing by Title

Sort by: Order: Results:

  • Mon, Aye Chan; Khaing, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The most important field, enrollment and controlling the students’ data is very essential for all universities. Nowadays, computers are being used in the field of information in different way. When it is linked from one ...
  • Mon, Aye Chan; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Entity Resolution is the task of identifying duplicated records that refer to the same real-world entity. It is costly process that can take up to days for large datasets. Various Blocking Methods have been applied in ...
  • Yee, Tin Tin; Naing, Thinn Thu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure in order to improve the storage capacity as well as cost effectiveness. To address this need, the cost effective PC ...
  • Khaing, Cho Cho; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud ...
  • Htun, May Tharaphy (University of Computer Studies, Yangon, 2022-06)
    Since the technology is being improved, digital media are facing challenges like copyright infringements. Digital data can be easily created, copied, processed, and distributed freely among unauthorized users. The ...
  • Win, Toe Nai; Aye, Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Transmission Control Protocol (TCP) use cumulative acknowledgement scheme to provide reliable stream delivery service. Cumulative acknowledgement has one major inefficiency, it does not provide information about all ...
  • Khine, Myat Thiri (University of Computer Studies, Yangon, 2019-11)
    Nowadays, Location-based services (LBS) are widely used in numerous areas such as positioning systems, tourist information, social and business areas. Many researchers try to develop the LBS application to fulfill the ...
  • Htay, Thandar; Khaing, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Grammar checking is one of the most widely used tools within natural language processing. Many word processing systems today include grammar checker which can be used to point out various grammatical problem in a text. ...
  • Hlaing, Su Myat; Oo, Khwar Nyo (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Retrieval of an image is a more effective and efficient for managing extensive image database. Content Based Image Retrieval (CBIR) is a one of the image retrieval technique which uses user visual features of an image ...
  • Aye, Kyar Nyo; Thein, Ni Lar (International Conference on Software and Computing Technology (ICSCT), Singapore, 2011-12-10)
    The proliferation of unstructured data continues to grow within organizations of all types. This data growth has introduced the key question of how we effectively find and manage them in the growing sea of information. ...
  • Thaing, Aye Nwe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In recent years, graph has become a powerful tool for representing and modeling objects and their relationships in various application domains such as protein interactions, chemical compounds, social networks, XML ...
  • Mar, Yi Yi; Nwe, Khine Moe; Maw, Aung Htein (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Range query processing is an essential role in many P2P applications including database indexing, distributed computing and location aware computing and commercial services based on current user’s location. Most of ...
  • Win, May Thu; Win, Kay Thi (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Interactive image segmentation has many applications in image processing, computer vision, computer graphics and medical image analysis. In medical applications, image segmentation is a fundamental process in most systems ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Nwe, Khine Moe; Zaw, Yu Mon (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The allocation of virtual machines in the cloud data center has been a challenge in recent years. The needed resources for virtual machine (VMs) allocation map to the available resources of physical machines (PMs). ...
  • Soe, Nyein Chan (University of Computer Studies, Yangon, 2020-01)
    Road traffic congestion or jam is the main problem in urban area of both developing and developed countries. In order to solve this problem, traffic congestion states of road networks are estimated so that the best optimal ...
  • Thu, Pyae Phyo; Lynn, Khin Thidar (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Khaing, Cho Cho; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud ...
  • Htun, Myo Thet (University of Computer Studies, Yangon, 2023-02)
    Audio identification techniques for unknown songs in today music industry are very popular for their auto detection ability to small pieces of audio signals. The research methodologies for audio identification systems ...
  • Aye, Aye; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In today's world of distributed environment, password authentication is very important to protect customer's sensitive data over Internet. The mainly two types of password are static password and dynamic password. Static ...

Search Repository

Browse

My Account