Browsing by Title

Sort by: Order: Results:

  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...
  • Hlaing, Aye Mya (University of Computer Studies, Yangon, 2020-06)
    This thesis focuses on enhancing Myanmar Text-to-Speech (TTS) system to generate more natural synthetic speech for a given input text. Typical TTS systems have two main components, text analysis (front-end), and speech ...
  • Thuzar, Pyae Phyo; Kham, Nang Saing Moon (2017-12-27)
    Multilayer feedforward networks are one of the most used neural networks in various domains because of their universal approximation ability. One of the popular algorithms for training multilayer feedforward network ...
  • Mon, Ohnmar Min; Win, Tha Pyay; Mon, May Thida (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Software-Defined Networking (SDN) based architectures, such as Open Flow, offer a chance to design such a control plane. The SDN controller performs all complex functions, including routing and security checks. Segment ...
  • Aung, Theint Theint Ei Htet; Thein, Nilar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Information security is becoming more important in data storage and transmission. Because of widely used images in security process, it is the important confidential image data from unauthorized access. The original ...
  • Han, Wai Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The presence of background noise in recorded speech reduces the quality of speech. It can also degrade the performance of other systems, such as speech compression, speech recognition, and speaker authentication. The ...
  • Soe, A Nwe; Myo, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, every organization is needed not only to record but also to manage and analyze a huge amount of data. Data warehouse and OLAP techniques are valuable tools for today’s competitive, fast evolving world. There have ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Storage management is one of the most popular challenging tasks in cloud computing data storage. NoSQL became widely known data stores in distributed data storage for two reasons: (1) high until almost ultimate scalability ...
  • Htwe, Thin Thin (University of Computer Studies, Yangon, 2022-04-21)
    In clothing shops, finding user’s desired dress manually is time consuming and needs a large amount of human labor. Although k-Nearest Neighbor (kNN) search algorithm is one of the most popular methods among many ...
  • Khine, Phyo Thu Thu; Win, Htwe Pa Pa (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The rapid development of industry enterprises, the large amount of data generated by these originalities and the exponential growth of industrial business website are the causes that lead to different types of big data ...
  • Mung, Pau Suan; Phyu, Sabai (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    Ensemble learning technique is proposed in this paper for better efficiency of healthcare classification and prediction. Healthcare industry is an ever-increasing rise in the number of doctors, patients, medicines and ...
  • Aung, Htet Htet (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Artificial neural networks(ANNs) are computing models for information processing and pattern identification. An ANN is a network of many simple computing units called neurons or cells, which are highly interconnected and ...
  • Phyu, Myat Pwint; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As computer systems are taking more and more responsibilities in critical processes, the demand for storage is increasing due to widespread applications. Saving the digital information in a large disk is expensive and ...
  • Khaing (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Enterprise resource planning (ERP) system has been one of the most popular business management systems, providing benefits of real-time capabilities and seamless communication for business in large organizations. ...
  • Aung, Ei Mon Mon; Min, Mar Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Voice Activity Detection (VAD) is used to detect the presence of speech in an audio signal. VAD plays an important role as a preprocessing stage in numerous audio processing applications. In Voice over IP (VoIP) and ...
  • Thaw, Tin Zar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Extensible Markup Language (XML) Schema documents (XSD) play an important role in software development process and need to be qualified with software qualities. A good quality design of XSD increases software productivity ...
  • Linn, Kyi Sein; Ko, Lin Min (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In today world use high speed computers. Communication between one computer and another or between the computer and its peripheral devices must be as error free as possible. However, error free data transmission in ...
  • Aung, Thida; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Pushdown Automata (PDA) is one of the hierarchies of automata theory models appropriate for the design of compiler. This system implemented to detect the compile errors of the HTML program when basic beginners who write ...
  • Aung, Thida; Sein, Myint Myint (International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 2020-02)
    On 24th August 2016, the magnitude of a 6.8 earthquake struck in Bagan from the depth of 52 miles. This earthquake caused much damage in historic pagodas in Bagan, one of the archeological houses in Asia. Analyzing the ...
  • Aung, Thida (University of Computer Studies, Yangon, 2020-08)
    Natural disaster is one of the major threats to cultural heritage in the developing countries. Floods, earthquakes, fires, environmental fatigue or similar long-term climatic effects can cause irreversible damage to ...

Search Repository

Browse

My Account