Browsing by Title

Sort by: Order: Results:

  • Han, Khin Myo; Thein, Tin Tin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The understanding of abbreviations, widely used in writing is an important role for natural language processing (NLP) applications. Many abbreviations are followed a predictable pattern in which the first letter of each ...
  • Thin, Khin Saw Yu; Han, Thwe Mu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper proposes a system for recognizing the identity card number. The quality of the color image of identity card is enhanced by image filtering technique. Color sensing is carried out to get the image portion of ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Protection of IEEE 802.11 networks means protection against attacks on confidentiality, integrity and availability. Possible threats come from vulnerabilities of security protocols. The rapid growth in the use of ...
  • Win, Ei Shwe Sin; Mon, Myat Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper to protect copyright, ownership and content integrity of digital media including digital watermarking techniques. The primary motivation of this article is to study the principles of cryptographic primitives ...
  • Lwin, Thin Yu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The modern era is of digitalization and thus we want to transmit large data in limited bandwidth. Today a variety of computer, scientific and engineering application have difficulty to store and transmit the large size ...
  • Reen, Mau; Khaing, Khathy (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image compression is very important in many applications, especially for progressive transmission, image browsing, multimedia applications. Image contains large amounts of information that requires much storage space, ...
  • Thant, Wut Yee; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, we propose a support vector machines (SVMs) method of classifying image regions hierarchically based on their semantics rather than on low-level features. First, image regions are segmented using the ...
  • Thu, May Phyo; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has ...
  • Khaing, May Thet; Aye, Zin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Aung, Yi Yi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Win, Htwe Pa Pa; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image enhancement processing step is the basic crucial part of the OCR system as the recognition accuracy of OCR systems greatly depends on the quality of the input text image. Most of the OCR systems, especially Myanmar ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Htwe, Ah Nge; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image resampling is a process which change the size of an image. It generates output image of the specified dimension with the help of the interpolation techniques. The up-sampled images are lost fine detailed information ...
  • Oo, Shwe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Content-based image retrieval (CBIR) is the uses of visual features of the image, such as color, texture, shape, match the query image and database, return similar image to the user. Color is the most significant feature ...
  • Htwe, Ah Nge; Nge, Mi Mi (International Conference on e-Business (iNCEB), 2009-10)
    Image zooming is a vital role in image processing. The zoomed images can be distorted because of blocky or jaggy effects. Sometimes, there is a problem to define the content of image or photo. The distorted image is needed ...
  • Moe, Myint Myint; Oo, Khine Khine (Proceedings of the Tenth International Conference on Science and Engineering (ICSE 2019), 2019-12-07)
    Test-driven development (TDD) is a foundation for software evolution but unit tests must be performed before production code. To enhance both external code quality and programmers’ productivity can be insisted on the ...
  • Thant, Lwin May; Phyu, Sabai (ICCA, 2021-02-25)
    In a medical problem, investigation of powerful new tools is involved in essential role of high-throughput sequencing technologies. Microarray data sequencers produced a large and complex sets of data for the advancement ...

Search Repository

Browse

My Account