Faculty of Information Science: Recent submissions

  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Han, Wai Wai; Oo, Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Requirements elicitation is vital importance in system development process. While doing software system development, the stakeholders can’t states real and nearly complete requirements because they might not know what ...
  • Win, Nay Aung Soe; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Big data in terms is the huge volume of data that is difficult to be processed, handled and managed. The term big data is an emerging trend where a number of researches and data scientists are carried out for data ...
  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Mon, Su Su; Oo, Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A distributed database is a database with its data elements stored at several sites of a computer network. Certain data items may be redundantly stored at more than one site for reliability reasons. A replicated database ...
  • Hlaing, May Me Me; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the process of analyzing large data sets in order to find patterns. Mining frequent patterns is a fundamental and crucial task in data mining problems. The association rule mining is needed in order to ...
  • Mhon, Gant Gaw Wutt; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Web usage mining is the discovery of user access patterns from Web usage logs. The paper presents two XML (Extensible Markup Language) 1.0 applications and a web data mining application which utilizes it to extract web ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’queries ...
  • Kham, Nang Saing Moon; Thin, Lwin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new ...
  • Khaing (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Non-Governmental organizations (NGOs) have a significant role in the development of the society because they play a vital role in the interest of general public. There are many problems faced by those NGOs regarding ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Soe, Yan Naung; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Mobile devices have gained tremendous popularity over the last few years. The most popular usage is the smart phones. They are accepted and admired by many mainly because they are capable of providing services such as ...
  • Kyaw, May Thu; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today, mobile devices have become a widely used for personal and business purposes. Because of the popularity of mobile application, inexpensive ways for people to communicate and share information, they become the ...
  • Lwin, Wai Wai; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The World Wide Web, the largest shared information source is growing exponentially and the amount of business news on the web is overwhelming and need to be handled properly. As such, grouping the web document into ...
  • Win, Chaw Su; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Web pages consist of both informative and non-informative content for the users. Web Page Indexing System, Web Page Classification and Clustering System and Web Information Extraction System that help the users to support ...
  • Mon, Aye Chan; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Entity Resolution is the task of identifying duplicated records that refer to the same real-world entity. It is costly process that can take up to days for large datasets. Various Blocking Methods have been applied in ...
  • Maung, Su Su; Aung, Nyein Myint Myint (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents the text block segmentation for image search system.Web pages are segmented into blocks for getting the text with images. Text block with images are later used as captions of images and hence plays an ...
  • Win, Su Su; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To ...

Search Repository



Browse

My Account