UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Win, Honey; Than, Khin Ma Ma (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The system includes two parts: checking the proposal whether it can be accepted or not and calculating the premium for accepted client and performing the insurance claim prediction by using Multiple Linear Regression ...
  • Ohsawa, Yutaka; Hlaing, Aye Thida (Twelfth International Conference On Computer Application (ICCA 2014), 2014-02-17)
    This paper proposes a shortest path search algorithm based on materialized-path-view constructed only on partitioned subgraphs, and its three variations referring different levels of distance materialization. A road ...
  • Khine, May Aye; Nu, Than Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A linear programming model is built to explore the possibilities of optimizing farm returns, consider-ing crop activities for selected crop region. To deter-mine the optimum organization of crops, three dis-tricts in ...
  • Myint, Khin Swe Swe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Virtualization can provide significant benefits in data centers by eliminating overload nodes. An increasing workload can be handled by allocating the resources to a virtual server and storage, if idle resources are ...
  • Myint, Khin Swe Swe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Virtualization techniques provide the carving individual physical servers into multiple virtual containers that can be run and managed separately. However, due to the uncertainty of workload variation, the workloads ...
  • Aung, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases ...
  • Aung, Ohnmar; Thein, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases (middle ...
  • Paing, Aye Myat Myat (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Business applications running on IT infrastructure necessitate high levels of availability in order to minimize the amount of downtime experienced during any planned and unplanned outages. As a result, disaster recovery ...
  • Thu, Yin Yin; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The explosive growth of location-detection devices, wireless communications, and mobile internet has resulted in the realization of locationbased services as commercial products and research prototypes. Unfortunately, ...
  • Aung, Nay Win; Thein, Thin Lai Lai (ICCA, 2021-02-25)
    In order to reduce the risks related to the expressway vehicle accidents, it is considered that the timely hazard information and the prompt rescue operations are the vital elements to save the victims and users of the ...
  • Thu, Myint; Sein, Myint Myint (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    With the development of mobile Internet, more and more people begin to get convenient service by mobile phones. Obtaining one's current location by GPS positioning or network positioning has become one of the important ...
  • Zin, Wai Wai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to advances in technologies, most of the information is kept electronically. Steganography and Cryptography are two popular ways of sending vital information in a secret way. In this paper, an image steganography ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • Kyaw, May Thu; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The increasing popularity of smartphones and tablets has introduced Android malware which is rapidly becoming a potential threat to users. A recent report indicates the alarming growth rate of Android malware in which ...
  • Aung, Swe Swe; Khaing, Kyawt Yin; Aung, May Phyo; Phyo, Nang Wai Wai; Aung, Darli Mying; Naing, Thinn Thu (ICCA, 2021-02-25)
    Digital contact tracing is one of supportive tools for the prevention and reduction of wide spread of the covid-19 virus. Machine learning is one of the most supportive approaches for contact tracing applications. Thus, ...
  • Yi, Htay Htay; Aye, Zin May (ICCA, 2021-02-25)
    Today, malicious users are widespread and are frequently lengthening worldwide. So, network security becomes crucial in the domain of education, government, business, and other sectors with related network connections. The ...
  • Khaing, Myint Soe; Aye, Zin May; Tun, Thazin (ICCA, 2021-02-25)
    Internet of Things(IoT) security is one of the main issues when executing and creating IoT platforms. The significant increment of the IoT devices in smart homes and other smart infrastructure make numerous attacks on these ...
  • Thuai, Khaing Mar; Thant, Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Decision Tree algorithms are the most popular algorithms for classification in data mining field. The main goal of classification is prediction of the categorical labels (classes). In this system, ID3 algorithm is used to ...
  • Htwe, Chaw Su; Thwin, Mie Mie Su; Thant, Yee Mon (ICCA, 2021-02-25)
    The malware attacks are targeting IoT devices as the rapid development of these devices. The limited resource of IoT devices is attracting malware developers. The strong security mechanisms cannot be deployed on these ...
  • Mar, Ohn; Tun, Khin Mar Lar; Hlaing, Swe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Data security is one of the most crucial and a major challenge in the digital world. Security, privacy and integrity of data are demanded in every operation performed on internet. This paper focuses on implementing the ...

Search Repository



Browse

My Account