Browsing by Title

Sort by: Order: Results:

  • Than, Kyaw Myo; Htay, Hla Hla (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, we propose a method for identifying font scripts of Myanmar Language. Because of the unavailability of nationwide standardized encoding scheme in Myanmar font scripts, knowledge written in Myanmar language ...
  • Aung, Moe Zaw (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the real world, the football sport league scheduling is very popular, while the people all over the world are encouraging and watching football matches interestingly. The existing situation according to the program ...
  • Aung, Htet Htet (fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This system forecasts in water level in Pyay river state. Water level is forecasted by using water level is forecasted by using Fuzzy Logic. This paper is to describe the implementation of flood condition system of ...
  • Myint, Aye Nandar; Khine, May Aye; Khaing, Myo Kay (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, forecasting of exchange rates plays an important role in international economics. Additional to basic economic and financial news, investors and traders employ in their decision process technical tools to ...
  • Wutyi, Khaing Shwe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Forecasting of weather is very popular in nowadays. But forecasting the future from the observed past is very difficult. There are several forecasting methods for weather data. Among them, evolving artificial neural ...
  • Htwe, Thandar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The forecasting of rice production is considered as one of the real world complex problems due to its non-deterministic nature and uncertain behavior. Fuzzy time series relies on real time fuzzy values for the input ...
  • Cho, Khin Mar; Aung, Swe Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This system estimates water level in Chindwinn River with seasonal movement in time series. This system uses seasonal movement approach. Time-Series is a set of observations generated sequentially in time. This system uses ...
  • Htun, Naing Linn; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The popularity of social media applications has rapidly increased over the past few years. Most people use social media applications for sharing data, chatting with friends, group conversations, uploading photos and media. ...
  • Oo, Myat Nandar (University of Computer Studies, Yangon, 2019-01)
    In the era of Big Data, Hadoop Big Data Platform has been embraced by both individuals and organizations as it can offer cost-effective, large capacity storage and multi-functional services on a wide range of devices. ...
  • Oo, Myat Nandar; Thein, Thandar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays Hadoop becomes a popular business paradigm for managing and storing the Big Data. It is possible for malicious users to abuse Big Data storage system and the number of illegal usages on them has increased ...
  • Lwin, Htar Htar; Aung, Wai Phyo (Proceedings of the First University Research Conference on Science and Engineering, 2020-01-23)
    This paper aims to analyze digital forensics of specific Android mobile financial applications such as m-banking and m-pay applications used in Myanmar. Some applications may store customer’s credentials on the phone’s ...
  • Aung, Nay Aung; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Cloud storage forensics has recently emerged as a salient area of inquiry. One area of difficulty is the identification and acquisition of potential data when disparate services can be utilized by criminals. There is ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Web is one of the most popular and richest sources of information. The source of data for a Web page is generally a relational database which has been recognized as a key factor in generating huge amounts of data ...
  • Yar, Kay Thi (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the ...
  • War, Nu (2009-12-30)
    At the core of the presented system is a highly robust fingerprint extraction method which enables searching a large fingerprint database with only limited computing resources. Requirements for such systems include ...
  • Oo, May Mar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, network – oriented computing environments require high – performance, distributed database systems that can satisfy both the data consistency control of replica management and data storage requirements ...
  • Htwe, Thandar Su Nge (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Grid has emerged recently as an integration infrastructure for sharing and coordinated use of diverse resources in dynamic, distributed environment. OGSA-DAI (Open Grid Services Architecture Data Access and integration) ...
  • Maung, Zin Maung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Myanmar language has long been influenced by the usage of Pali words since ancient times. This study proposes a framework for identifying Pali words in Myanmar text to analyze the influence of Pali words on Myanmar ...
  • Htay, Hsint Hsint; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image inpainting involves filling in part of an image using information from the surrounding area. Applications include the restoration of damaged photographs and movies and the removal of selected objects. A framework for ...
  • Oo, May Mar; Yi, Aye Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to continuous growth of the Internet technology, it needs to establish security mechanism. However, many current intrusion detection systems (IDSs) are rule-based systems, which have limitations to detect novel ...

Search Repository

Browse

My Account