Browsing by Title

Sort by: Order: Results:

  • Htay, Than Than; Phyu, Sabai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Apache Hadoop exposes 180+ configuration parameters for all types of applications and clusters, 10-20% of which has a great impact on performance and efficiency of the execution. The optimal configuration settings for ...
  • Oo, Myat Cho Mon (University of Computer Studies, Yangon, 2021-02)
    In the current big explosion era, data is increasing dramatically every year. Gaining critical business insights by querying and analyzing this vast amount of data is becoming a challenge for conventional data mining ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Semantic Web is an extension of the current Web that will allow to find, share, and combine information more easily. To harvest such power requires robust and scalable data repositories that can store RDF data. ...
  • Aye, Htar Htar; Phyu, Kyaw Zar Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Peer to Peer system extends ideas about distributed computing and client server computing, blurring the distinction between clients and servers. The P2P paradigm was recently adopted in the database community to overcome ...
  • Ei, Nyein Nyein (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The system extracts optimal rule from weather data set based on rough set theory. The main idea of rough set theory is to obtain as simple as rules from the given database by reducing the database while holding the ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As the internet evolves and computer networks become bigger and bigger, network security is one of the most challenging issues in today's world that touches many areas using network communication. Nowadays, there is a ...
  • Myint, Sharr Wint Yee; Oo, Twe Ta (University of Computer Studies, Yangon, 2019-03)
    The development in digital technologies and advanced speech analysis/synthesis tools these days enable speech signals to be tampered without leaving any perceptual clues. As an important information carrier, the integrity ...
  • Myint, Hla Hla; Aung, Soe Lin (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    In medical image processing, segmentation of the internal structure of brain is the fundamental task. The precise segmentation of brain tumor has great impact on diagnosis, monitoring, treatment planning for patients. Various ...
  • Zaw, Yu Mon; Nwe, Khine Moe (Proceedings of the 10th International Conference on Science and Engineering (ICSE 2019), 2019-12-07)
    Cloud computing is the on-demand availability of computer system resources and services over the internet and cloud data centers play important role in fulfilling on-demand facilities such as servers, communication media ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, scheduling problems such as employee scheduling, university timetabling, arise in almost all areas of human activity. In the literature, there are many methods to solve it. Some of the most effective techniques ...
  • Thwel, Tin Thein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As the amounts of storage utilization become the vast, people are being encountered out of storage space in almost every situation. Therefore, they tried to find out the efficient ways to safe storage space. The single ...
  • Tun, Thant Zin; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Cloud data centers offer utility-oriented IT services to users worldwide. The nature of resource demand of cloud data centers is elastic as the overall workloads are always changing. For handling dynamic workload nature ...
  • Myint, Zin Thu Thu; Tun, Myint Thu Zar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Personal Learning Environment (PLE) technology is centered on the concept of self-regulated learning that creates responsible learners, who are capable of critical thinking and able to plan their own learning processes. ...
  • Sone, Aye Pyae; Nwe, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web page typically contains many information blocks. They are navigation panels, copyright and privacy notices and advertisements. These blocks are useful for business purposes. These blocks are called as the noisy ...
  • Nandar, Hsu Myat (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Cryptography is one of the most important sciences in the current area. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Nge, Khin Hnin; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper is represented for information security by using cryptography on important message and image steganography method on digital image. The secure system is implemented by combining for the encrypted message and ...
  • Soe, Akari Myint; Cho, Zarli (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The Internet as a whole does not use secure links, thus information in transit may be susceptible to interception as well. The important of reducing a chance of the information being detected during the transmission is ...
  • Thaung, Thein Than; Htike, Win Win (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Steganography is the art of hidden information in other information when communication is taking place. Many different carrier file format can be used, but audio waves are the most difficult and more secure because audio ...

Search Repository

Browse

My Account