Browsing by Title

Sort by: Order: Results:

  • Khaing, Ngwe Zin; Sandar, Khin; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining in an area in the intersection of machine learning statistics, and database is to use searching for relationships and global pattern that exits, but is hidden in large database. The discovery of interesting ...
  • Htun, Sai Zaw Moe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper studies the Minimum Spanning Tree Methods. A graph is a collection of nodes and edges, but has no rules dictating the connection among the nodes. All trees are graphs. A tree is a special case of graph in ...
  • Hlaing, Wai Mar (University of Computer Studies, Yangon, 2020-12)
    Finding different possible ways in Public Bus Transportation System are essential for users. Most systems implement to search one shortest route for advising the user. Sometimes, the shortest route is not the best for ...
  • Soe, Nwe Nwe; Htay, Win (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper offers finding the region of interest and automatic cropping from palm leaf manuscripts developed by using one-dimensional segmentation. This system can be used to provide for enhancing palm leaf manuscripts ...
  • Oo, Aye Thandar; Khin, Mie Mie (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is intended to present optimal route finding system for road network application. It is used to operate in complicated mapping situations and new unknown environments. This technique can be implemented to find ...
  • Win, Zin Me Me; Maw, Tin Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the significant increment of today’s network, there is a decrease in the efficiency of the network. The performance and reliability of the Internet depend, in large part, on the operation of the routing protocols. ...
  • Thu, Hnin Pwint; Aung, Khin Sanda (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, the transportation becomes a vital role in developing countries so people need to know the shortest ways. Therefore, this system will be developed intending to reduce the transportation time by applying one ...
  • Htun, Nyi Nyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents a method based on receptor model for finding the shortest smooth path in variable size with safety margin, where clothoid curvature is used for smoothing path. The method modifies the results of grid-based ...
  • Htwe, Khin Sabai; Aye, Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a Region of Interest (ROI) extraction method is proposed based on labeling vein images using morphological processing. Firstly, finger vein images are segmented to remove the unwanted background or the ...
  • Min, Mar Mar; Thein, Yadana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, we have presented a Fingerprint Recognition System which combines both the features extraction by applying a statistical and geometry approach. First, the core point (CP) of the input fingerprint is detected. ...
  • Win, Zin Mar; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Fingerprint recognition is one of the most well-known and publicized biometrics for personal identification. Fingerprints exhibit oriented texture-like patterns. The texture information of the fingerprint can be used ...
  • Win, Zin Mar; Sein, Myint Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Fingerprints are widely used in biometric techniques for automatic personal identification work. In this paper, a fingerprint recognition system is developed to identify a person according to fingerprint image on Myanmar ...
  • Phyo, Aye Su; Sandar, Khin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper proposes a fingerprint types classification algorithm using Learning Vector Quantization (LVQ) with FingerCode features. This algorithm assigns each fingerprint image to one of the five subclasses, according ...
  • Latt, Tin Myo; Thida, Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Morphological analysis (MA) is needed in any Natural Language Processing (NLP) Application. It means taking a word as input and identifying the stem and affix. MA provides information about a word’s semantics and the ...
  • Win, Kyaw Thu; Maw, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Agents have ability to communicate with one another in order to tackle the collectively problem that no single agent can, individually. They communicate with each other using Agent Communication Language (ACL). Agents also ...
  • Oo, Nan Haymarn; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Firewall provides filtering packets among network devices according to the security policy. As the firewall is an essential devices in traditional network, it is also a crucial application in the security of modern ...
  • Maw, San San (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The growth of digital image and video archives is increasing the need for tools that effectively filter and efficiently search through large amounts of visual data. In content-based image retrieval systems(CBIR) the most ...
  • Oo, Nan Haymarn (University of Computer Studies, Yangon, 2019-10)
    Flooding attack is a network attack that sends a large amount of traffic to the victim networks or services with the aim of causing denial-of-service. In SoftwareDefined Networking (SDN) environment, this attack might not ...
  • Mon, Myat Thida (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    With the high volume of traffic in recent network, traffic between the switches has exchanged rapidly among the servers that may conduct the link congestion. In a traditional network, routing protocols are used the ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Proceedings of 2019 International Conference on Advanced Information technologies (ICAIT 2019), 2019-11-07)
    With the rapid growth of current network, the demand of resources is growing significantly. Insufficient bandwidth results unstable throughput in a network. Software-defined network (SDN) has been proposed to provide optimal ...

Search Repository

Browse

My Account