Browsing by Title

Sort by: Order: Results:

  • Naing, Hay Mar Soe; Nyunt, Thi Thi Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, everybody is facing many problems with making decisions and future planning of global and regional works all over the world. The analytic network process (ANP) is one of the most widely used multiple criteria ...
  • Arakawa, Maiko; Okuyama, Yuichi; Mie, Shunsuke; Abderazek, Ben Abdallah (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    An attitude estimation is an important process for auto-piloting unmanned aerial vehicles (UAVs) control. We implemented the attitude estimation system from the visible horizon in the images. We use images from the ...
  • Maw, Aye Aye; Aung, Nwe Ni (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, hotels are in the large-scale distributed environments where each site offers services to user through transparent external communication. Web Services are becoming one of the most important paradigms for the ...
  • Kyu, Khin Mar (Proceedings of the International Conference on Science and Technology for Sustainable Development (2018), 2018-11-04)
    The students who scored high marks in Matriculation Examination are admitted to the Technological Universities. English is taught as a compulsory course to all Engineering students, regardless of their specialization, ...
  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Lwin, Nang Khine Zar; Naing, Tin Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Distributed Database has been used as the most essential technology for business organizations in recent years. The data allocation is a critical issue in distributed database design. Allocation of data among different ...
  • lai, Nan Wut Yi; Aye, Zin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of digital data in industrial process, it is essential to protect ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Now day’s security is the primary concerned in the field of computer science.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional ...
  • Thandar, Aye Mya (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Several recent machine learning publications demonstrate the utility of using feature selection algorithms in many learning. Feature selection helps to acquire better understanding about the data by telling which the ...
  • Swe, Thi Thi; Htay, Hla Hla (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Named Entity Identification includes locating named entities and classifying those names in text. NEI is an important task in NLP applications such as Information Extraction, Cross Language information Retrieval, Question ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays the provision of online services by government or business organizations has become a standard and necessary operation. Transferring data including the confidential or sensitive information via Internet or ...
  • Yee, Tin Tin; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure. Cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of ...
  • Aung, Htain Lynn; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    E-learning is the fast and essential method of delivering educational contents. E-learning can support one of the alternative ways of quality teaching and learning as well as lifelong learning. The paper argues for the ...
  • Hlaing, Swe Swe (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, the advancement in computing technology and the realibility of computers has led to signification changes in the way that data are collected and analyzed. This system is to predict the risk level of patients in ...
  • Win, Aye Thida; Win, Thin Zar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image recognition is one of the fields of Artificial Intelligence. Nowadays, Image recognition is affecting not only corporations using it within an economic interest but also the average user who uses a digital camera. ...
  • Oo, Sheinn Thawtar; Thida, Aye (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    At the present time, machine translation is progressively more and more used to support multilingual communications. In the process of machine translation, uses of figurative language are one of the reasons that can cause ...
  • Aung, Myintzu Phyo (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In machine translation system of Myanmar to English, grammar rules are used to translate the whole input Myanmar sentences to target English sentences. These rules are based on the pattern of simple sentences in ...
  • Soe, The` The` (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A variety of Verb Phrase exists in Myanmar Language including Simple Verb Phrase, Compound Verb Phrase and so on. This paper explains the feature of Myanmar Verb Phrase and English Verb Phrase. And then, the system ...

Search Repository

Browse

My Account