Browsing by Title

Sort by: Order: Results:

  • Soe, Mu Mu; Win, Thandar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Data Mining refers to using a variety of techniques to identify suggest of information or decision making knowledge in the database and extracting these in a way that they can put to use in areas such as decision support, ...
  • Wai, Thinn Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In statistical machine translation, reordering is crucial component for translation of the different languages with different word orders. Without reordering during language translation, sentences can only be translated ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Disaster recovery (DR) is an important element of the complex information technology (IT) systems. The availability of the IT for everything, from everywhere, at all time is a growing requirement. Effective IT strategies ...
  • Phyu, Myat Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Today’s storage systems have a great challenge for the long-term storage of massive amounts of unstructured data. Availability and reliability is the properties of the most storage system. In this paper, the data ...
  • Yee, Khin Ngu Wah Lai; Wai, Khaing Khaing (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Delivery of data files as large as media type files between business organizations using file transfer is becoming an increasingly attractive alternative to the physical movement of CDs, flash memory drives or disks. ...
  • Myint, Khin Su Mon; Naing, Win Win (ICCA, 2021-02-25)
    For each developing country, historical census population data are the most useful. It provides valuable information on a certain region of a nation. The matching historical census data means that many population census ...
  • Khine, San Nyein; Tun, Zaw (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Automation system is famous for all over the world. Nowadays, people have been trying to control everything automatically without any physical efforts. In the proposed work, home automation system has been introduced ...
  • Naing, Hay Mar Soe; Nyunt, Thi Thi Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, everybody is facing many problems with making decisions and future planning of global and regional works all over the world. The analytic network process (ANP) is one of the most widely used multiple criteria ...
  • Arakawa, Maiko; Okuyama, Yuichi; Mie, Shunsuke; Abderazek, Ben Abdallah (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    An attitude estimation is an important process for auto-piloting unmanned aerial vehicles (UAVs) control. We implemented the attitude estimation system from the visible horizon in the images. We use images from the ...
  • Maw, Aye Aye; Aung, Nwe Ni (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, hotels are in the large-scale distributed environments where each site offers services to user through transparent external communication. Web Services are becoming one of the most important paradigms for the ...
  • Kyu, Khin Mar (Proceedings of the International Conference on Science and Technology for Sustainable Development (2018), 2018-11-04)
    The students who scored high marks in Matriculation Examination are admitted to the Technological Universities. English is taught as a compulsory course to all Engineering students, regardless of their specialization, ...
  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Lwin, Nang Khine Zar; Naing, Tin Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Distributed Database has been used as the most essential technology for business organizations in recent years. The data allocation is a critical issue in distributed database design. Allocation of data among different ...
  • lai, Nan Wut Yi; Aye, Zin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of digital data in industrial process, it is essential to protect ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Now day’s security is the primary concerned in the field of computer science.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional ...
  • Thandar, Aye Mya (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Several recent machine learning publications demonstrate the utility of using feature selection algorithms in many learning. Feature selection helps to acquire better understanding about the data by telling which the ...
  • Swe, Thi Thi; Htay, Hla Hla (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Named Entity Identification includes locating named entities and classifying those names in text. NEI is an important task in NLP applications such as Information Extraction, Cross Language information Retrieval, Question ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays the provision of online services by government or business organizations has become a standard and necessary operation. Transferring data including the confidential or sensitive information via Internet or ...

Search Repository

Browse

My Account