UCSY's Research Repository

Browsing Faculty of Information Science by Title

Browsing Faculty of Information Science by Title

Sort by: Order: Results:

  • Thu, Yin Yin; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The explosive growth of location-detection devices, wireless communications, and mobile internet has resulted in the realization of locationbased services as commercial products and research prototypes. Unfortunately, ...
  • Kyaw, May Thu; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The increasing popularity of smartphones and tablets has introduced Android malware which is rapidly becoming a potential threat to users. A recent report indicates the alarming growth rate of Android malware in which ...
  • Zune, Sheilar; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Database security and integrity are essential aspects of an organization’s security posture. Database security is the system, processes, and procedures that protect a database from unintended activities. It is important ...
  • Khaing, Myo; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A central problem in machine learning is identifying a representative set of features from which to construct a classification model for a particular task. A good feature set that contains highly correlated features ...
  • Mon, Shun Ei; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Recommender systems on web pages are a subclass of information filtering system that seeks the relevant web pages according to prediction of the 'rating' or 'preference' that a user would give web page. Nowadays, the ...
  • Lwin, Wai Wai; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The World Wide Web, the largest shared information source is growing exponentially and the amount of business news on the web is overwhelming and need to be handled properly. As such, grouping the web document into ...
  • Win, Htet Htet (University of Computer Studies, Yangon, 2019-01)
    Information applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Physical activity is an essential component of a healthy lifestyle. It is clear that physically active people have a lower disease risk than sedentary individuals. Thus the measurement for physical fitness becomes the ...
  • Lin, May Phyo Wai; Oo, Khine Khine (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The goal of the proposed system is to derive models for forecasting the final price of ongoing auction. The forecasting task is important not only to the participants of an auction who compete against each other for the ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Win, Su Su; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’queries ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In information retrieval, the users’ queries often vary a lot from one to another. Most IR systems use a single fixed ranking strategy to support the information seeking task of all users for all queries irrespective ...
  • Kham, Nang Saing Moon; Thin, Lwin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new ...
  • Win, Sandar; Thein, Thin Lai Lai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Nowadays, real-time information is very important and learning based human motion has fascinated range from detection to tracking state in Computer Vision. In this system, the real-time videos are used to detect, track, ...
  • Oo, Nwe Ni; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recommender systems use the opinions of a community of users to help individuals in that community more effectively identify content of interest from a potentially overwhelming set of choices. One of the most successful ...
  • Zaw, Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    HDFS (Hadoop Distributed File System) is designed to store big data reliably, and it has been distributed file. However, it is not replacement for failure nodes. Replication technology is a key component in every computing ...
  • Htay, Hsu Myat; Oo, Khine Khine (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The Abhidhamma is one of the three parts of the Pali cannon, the Tipitaka, the main texts of Theravada Buddhism and is sometimes described as ‘Buddhist Psychology’ [2]. Human mind is consciousness (citta) and mental ...
  • San, Khine Aye; Thein, Thin Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper implements the waiting line of clinic by using Queuing Theory to save the time-limit. The system is using the multiple queue line. One is for emergent patients, one is for old patients, another one is for new ...

Search Repository



Browse

My Account