UCSY's Research Repository

Browsing Ph.D/Master Thesis & Dissertation by Title

Browsing Ph.D/Master Thesis & Dissertation by Title

Sort by: Order: Results:

  • Oo, Htun Zaw (University of Computer Studies, Yangon, 2018-08)
    Many organizations use World Wide Web for multipurpose platform during these days. It is very important to understand how a web site is being used by users. Web usage mining also known as web log mining, aims to discover ...
  • Win, Thida (University of Computer Studies, Yangon, 2022-06)
    Peer-to-Peer (P2P) file sharing is a technique of network file sharing. Clients can direct access and share the files to other clients in P2P network. The P2P file sharing system does not require any central server. ...
  • Win, Htet Htet (University of Computer Studies, Yangon, 2019-01)
    Information applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...
  • Win, Hlaing Hlaing (University of Computer Studies, Yangon, 2021-11-23)
    Data mining techniques are extensively used for data analysis in a variety of applications. Especially, credit analyzers often use predictive analysis of credit risk to determine the applicant users are to be trusted ...
  • Aung, Win Pa Pa May Phyo (University of Computer Studies, Yangon, 2023-01)
    Employee attrition is the departure of employees from the organization for any reason (voluntary or involuntary), including resignation, termination, death, or retirement. Attrition is widely understood to be one of ...
  • Zu, Chan Myae Myint (University of Computer Studies, Yangon, 2022-06)
    Nowadays, the education system has been changed from teacher centered approach to learner-centered approach. Thus, students’ related features need to analyze to predict students’ academic performance to provide the ...
  • Khine, Kyi Lai Lai (University of Computer Studies, Yangon, 2019-10)
    Nowadays, data is extremely growing very fast to become “BIG DATA”, any voluminous amount of structured, semi-structured and unstructured data, which has high potential to be mined for valuable information in decision ...
  • Win, Phyu Phyu (2022-09)
    Online banking system has created an enormous impact on IT, Individuals, and networking worlds. Online banking systems and its exclusive architecture have numerous features and advantages over traditional banking system. ...
  • OO, MAY ZIN (University of Computer Studies, Yangon, 2023-01)
    In recent years, with the advancement of high speed communication networks, multimedia applications which consists of a collection of multiple media such as text, graphics, images, sound, and video became popular. Due ...
  • Thazin, Nwe (Unversity of Computer Studies, Yangon, 2019-11)
    Quality of Service (QoS) is the overall performance of a computer network, particularly the performance seen by the users of the network. By managing the delay, bandwidth, and packet loss parameters, it allows us to ...
  • Yee, Chue Wut (Unversity of Computer Studies, Yangon, 2020-01)
    Nowadays, with the development of the internet, it is available to collect very large amounts of data and searching effective information from these data develop into an essential work. The major purpose of an Information ...
  • Oo, Sabai (University of Computer Studies, Yangon, 2022-06)
    CORONAVIRUS DISEASE (COVID-19) is the infectious disease caused by the coronavirus that was first discovered in Wuhan City, China, and then spread throughout the world. Many researchers have proposed various methods ...
  • Aung, Thidar (University of Computer Studies, Yangon, 2019-08)
    Text document segmentation is one of the essential steps in text document recognition and extraction systems. The existing image segmentation methods are not much reliable for text with colour gradient and texture ...
  • Nwe, Yie Yie (University of Computer Studies, Yangon, 2022-09)
    Database security is the system, processes, and procedures that protect a database from unintended activity. The protection of data storage is a challenging and formidable task and so the user data should be protected ...
  • Hlaing, Hnin Hsu (University of Computer Studies, Yangon, 2022-06)
    Nowadays, telecommunication technologies are developing rapidly and many organizations are mostly using these technologies. The well known telecommunication technology is the short message service (SMS). It plays a ...
  • Wai, Koung Hsu (University of Computer Studies, Yangon, 2022-06)
    Data security plays an important role in every organization. Therefore, many organizations need to protect their information or data when data in transmission. This system intends to implement the combination of the ...
  • Thu, Chan Myae (University of Computer Studies, Yangon, 2022-09)
    Today people are widely used internet, electronic records because of their ease of alteration and fast transition. The society is becoming more and more digitalized – therefore Information security is becoming more ...
  • Phu, Khing Shwe Ye (University of Computer Studies, Yangon, 2022-09)
    Address Resolution Protocol (ARP) is a very popular communication protocol in the local area network (LAN), working under the network layer, as per the open systems interconnection (OSI) model. ARP is used by computers ...
  • Wai, Chit Hnin (University of Computer Studies, Yangon, 2022-06)
    Nowadays, communication is becoming more and more important to keep in touch with family and friends. Computer networks play a key role in this paper. To make this facilitating, Network engineers have used protocols ...
  • Yu, Thein (University of Computer Studies, Yangon, 2023-04)
    As the development of internet technology is raising, the volume of information used for the internet users also increase in the web. Users can apply that information and give opinions for decision making system. ...

Search Repository



Browse

My Account