Browsing by Title

Sort by: Order: Results:

  • Hlaing, Yu Wai; Oo, Kyaw May (2015 IEEE International Conference on SmartCity/SocialCom/SustainCom together with DataCom (SmartCity2015), 2015)
    The field of graph datasets and graph query processing has received a lot of attention due to constantly increasing usage of graph data structures for representing data in different domains. Storing the graph in large ...
  • Hlaing, Yu Wai; Oo, Kyaw May (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Graphs are widely used to model complex structured data. Given a graph query, it is desirable to retrieve graphs quickly from a large database via graph-based indices. In this paper, we propose a graph indexing and ...
  • Hlaing, Yu Wai (The 12th National Conference on Science and Engineering 2019 (NCSE 2019), 2019-06-27)
    Graph datasets face a great challenge arising from a massive increasing volume of new structural graphs in bio-informatics, chem-informatics, and business processes, etc. One of the essential functions in graph dataset ...
  • Hlaing, Yu Wai (National Journal of Parallel and Soft Computing, 2019-03)
    Graph datasets face a great challenge arising from a massive increasing volume of new structural graphs in bio-informatics, chem-informatics, business processes, etc. One of the essential functions in graph dataset is ...
  • Hlaing, Yu Wai; Oo, Kyaw May (9th International Conference on Genetic and Evolutionary Computing (ICGEC2015), 2015)
    Graphs are prevalently used to model the relationships between objects in various domains. Storing the graphs into large databases is a challenging task as it deals with efficient space and time management. Unlike item ...
  • Hlaing, Yu Wai; Oo, Kyaw May (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Graphs are prevalently used to model the relationships between objects in various domains. With the increasing usage of graph data, it has become more and more demanding to efficiently process graph queries. Querying ...
  • Khaing, Soe Soe; Yin, Zin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In network-based data mining, clique percolation brings an attractive feature for finding communities in a graph as well as the overlapping areas of these communities. Despite complete clique formalization, some of the ...
  • Thu, Ye Kyaw; URANO, Yoshiyori (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We present the grapheme cluster segmentation tool for Myanmar text based on our proposed Positional Prediction text input concept. Motivation of this research is to develop the Positional Prediction database of Myanmar ...
  • Aung, Swe Zin (University of Computer Studies, Yangon, 2022-09)
    Grapheme to Phoneme Conversion (G2P) is the task of automatically generated the pronunciation on a given input word. Pronunciation dictionary is one of the most important things for building automatic speech recognition ...
  • Soe, Ei Phyu Phyu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Grapheme-to-Phoneme (GTP) conversion is one of the most important parts for text-to-speech synthesis of Myanmar language. TTS system is firstly faced with the conversion of input text into linguistic representation usually ...
  • Myint, Khin Swe Swe; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Datacenters have been the key system infrastructure for cloud computing. The demand for datacenter computing has increased significantly in recent years resulting in huge energy consumption. Renewable energy resources, ...
  • Hlaing, May Su; Aung, Sint Sint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In today's system, Geographic Information System is a very effective tool in completing many types of analysis and manipulation of data. The use of GIS has grown quickly in groundwater management and research. GIS is now ...
  • Aung, Khin Pa Pa; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents to recognize American Sign Language (ASL) hand gestures, based on a pattern recognition technique by using orientation histograms and backpropagation neural network (BPNN). The static ASL digitized ...
  • Chui, Chee-Kong; Nguyen, Binh P. (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Computer aided surgery and computer assisted robotic surgery are having more and more impact on medical care. This paper presents the architecture and work flow of an intelligent surgical robotic system that we ...
  • Myint, Nan San San; Thwin, Khin Lay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Handwriting digit recognition is a challenging problem researchers had been research into this area for so long especially in the recent years. In this paper, this system used to recognize the handwritten digits of Kayin ...
  • Htike, Theingi; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar handwritten characters. This paper involves three important steps, ...
  • Wai, Myat Thiri (University of Computer Studies, Yangon, 2020-02)
    Portable tablet PCs are very useful in relevant industry of this age because tablets are elegant in appearance and convenient to use. Important things are noted on tablet by handwriting easily in respective industry. ...
  • Htike, Theingi; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper an attempt is made to develop Myanmar handwritten character recognition system. Character recognition is an important area in image processing and pattern recognition fields. The aim of character recognition ...
  • Khing, Yadanar; Sein, Myint Myint; Win, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Handwriting authentication is considered as the most natural method of authenticating a person’s identity compared to other biometric and cryptographic forms of authentication. It involves specialize human skills and ...
  • Thin, Phyu Phyu; Thein, Thandar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The demand for cloud computing is increasing because of the popularity of digital devices and the wide use of internet. That makes malicious users to make crimes. Therefore a study of digital forensics investigations ...

Search Repository

Browse

My Account