UCSY's Research Repository

Browsing Faculty of Information Science by Issue Date

Browsing Faculty of Information Science by Issue Date

Sort by: Order: Results:

  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In information retrieval, the users’ queries often vary a lot from one to another. Most IR systems use a single fixed ranking strategy to support the information seeking task of all users for all queries irrespective ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Physical activity is an essential component of a healthy lifestyle. It is clear that physically active people have a lower disease risk than sedentary individuals. Thus the measurement for physical fitness becomes the ...
  • Thein, Yadana; Khine, Su Mon (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Web search engines play an important role for information retrieval on World Wide Web. There are many search engines according to their languages, but very few research areas for Myanmar Language. Search engine that ...
  • Thet, Yi Mon; Nyunt, Thi Thi Soe; Yuzana (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Since XML (eXtensible Markup) is the popular language for the data over the Internet, querying XML data is interested topic in research area. In order to efficiently process the XML query, indexing schemes are vital ...
  • Ko, Mon Mon; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    New security threats emerge against mobile devices as the devices’ computing power and storage capabilities evolve. Preventive mechanisms like authentication, encryption alone are not sufficient to provide adequate ...
  • Nyaung, Dim En; Thein, Thin Lai Lai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated ...
  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Yar, Kay Thi; Tun, Khin Mar Lar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for ...
  • Zaw, Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    HDFS (Hadoop Distributed File System) is designed to store big data reliably, and it has been distributed file. However, it is not replacement for failure nodes. Replication technology is a key component in every computing ...
  • Maw, Myint Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior… It is a disciplined way to clean up code that minimizes the chances ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Shwe, Lae Lae; Theint, Khant Kyawt Kyawt; Sein, Myint Myint; Thein, Thin Lai Lai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    3-D reconstruction of buildings in urban areas is one of the highlighted issues in photogrammetry, remote sensing, computer vision, and computer graphic. It can be used in various fields such as urban planning, construction, ...
  • Mon, Ei Ei; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electronic mail is used daily by millions of people to communicate around the world and it is a critical application for many businesses. Because of the fame of emails, the attackers utilize it to gather the sensitive data. ...
  • Lwin, Wai Wai; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The World Wide Web, the largest shared information source is growing exponentially and the amount of business news on the web is overwhelming and need to be handled properly. As such, grouping the web document into ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • Soe, Yan Naung; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Mobile devices have gained tremendous popularity over the last few years. The most popular usage is the smart phones. They are accepted and admired by many mainly because they are capable of providing services such as ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...

Search Repository



Browse

My Account