UCSY's Research Repository

Browsing by Author "Nwe, Nwe"

Browsing by Author "Nwe, Nwe"

Sort by: Order: Results:

  • Cho, War War; Nwe, Nwe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Frequent pattern mining is one of the active research themes in data mining. It is an important role in all data mining tasks such as clustering, classification, prediction and association analysis. Frequent pattern is the ...
  • Zaw, Myo Min; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The implementation of a helicopter descending and landing control system is presented. Descending and landing is to maintain the glide slope and heading and to reduce gradually airspeed and height from a point of altitude ...
  • Sone, Aye Pyae; Nwe, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web page typically contains many information blocks. They are navigation panels, copyright and privacy notices and advertisements. These blocks are useful for business purposes. These blocks are called as the noisy ...
  • Yar, Thar; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence (AI) is the computational part of the ability to achieve goal. A search algorithm, broadly speaking is an algorithm that takes a problem as input and returns a solution to the problem, usually ...
  • Yi, Htwe Htwe; Nwe, Nwe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This system is designed to help the users for retrieving the product and price information of the competitors’ website and monitor updated information in the competitors’ website for the most frequently interested product ...
  • Thu, Ei Ei; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, the significance of automated generation of object-oriented code from design models has increased due to its benefits, such as, cost reduction and time efficiency. This paper proposed a code generator for ...
  • Wai, Khaing Phyo; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The mobile communication technologies penetrate our society and wireless network to detect the movement of people to generate large amount of data mobility including mobile phone call records and Global Positioning ...
  • Win, Kyaw Thura; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure communication in physically vulnerable networks depends upon encryption of material passed between machines. It is feasible for each computer in the network to encrypt and decrypt material efficiently with arbitrary ...
  • Khaing, Phyu Phyu; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Real time monitoring of twitter tweet streams for trends has popularity in the last decade. This provide effective information for government, business and other organization to know what happening right now. The task ...
  • San, El Mi Mi; Nwe, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Tuberculosis (TB) is a social disease with medical aspects. By the increasing availability of biomedical and health-care data with a wide range of characteristics, computer-based medical system is playing an increasingly ...
  • Thu, Pyae Phyo; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Ever escalating usage of social media brings as a powerful communication and information sharing tool used by millions of people around the world to post how they feel and what is happening now. It turn into a potential ...

Search Repository

Browse

My Account