UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Oladipupo, Bilesanmi Yusuf; Thu, Ye Kyaw; Yoshiyori, Urano (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In recent years, the smart grid has occupied the area of power and grid management research and indeed a lot of brilliant works have been done. Nevertheless, most of these works have been designed only for the improvement ...
  • Zune, Sheilar; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Database security and integrity are essential aspects of an organization’s security posture. Database security is the system, processes, and procedures that protect a database from unintended activities. It is important ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The Semantic Web has been developed in order to publish and access a lot of information for automatically processing of data and information by machines rather than for people. RDF (Resource Description Framework) data ...
  • Kyi, Ye Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence is defined generally as the attempt to construct mechanisms that performed by humans. The knowledge base contains knowledge necessary for understanding, formulating, and solving problems. This ...
  • Htet, Khaing Suu; Sein, Myint Myint (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays, understanding demographic information on social influencer events is important for target customer analysis. Hence monitoring the crowded event requires an intelligent sophisticated technology with human ...
  • Lin, Khin Saw (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper presents a simple and efficient approach for predicting the dynamic behavior of the sucker rod string. The dynamic behavior of the sucker rod string is an important factor for predicting the performance of a ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Yamada, Hiroshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The characteristics of Lithium Ion Capacitor (below , abbreviated as LIC) as a charging device is similar to Lithium Ion Battery and has quite long life, it is 100 times more than Lithium Ion Battery charge and ...
  • Thaw, Tin Zar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The eXtensible Markup Language (XML) based web applications are used for data representing, exchanging and storing via internet by the usage of XML standard schema. If XML schema files are difficult to understand ...
  • Khin, Ei Ei; Phyu, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    A mobile ad-hoc network (MANET) is an autonomous wireless system which consists of several mobile nodes to form an arbitrary and temporary network. As the lack of infrastructure network, MANETs are facing various severe ...
  • Maung, Thiri; Hlaing, Swe Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    As the technology grows rapidly, medical diagnosis reasoning is a very important application area of computer-based system. People take a great interest in computer and then computerbased methods are increasingly used ...
  • Cherry, Hnin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Rough set theory is based on the establishment of equivalence classes within the given training data. All of the data samples forming an equivalence class are indiscernible, that is, the samples are identical with respect ...
  • Swe, Thinn Mya Mya; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In medical applications, domain knowledge may be used to avoid wrong decisions, to be able to make a correct decision for strong working diagnosis and partly for therapeutic purpose. In this paper, the Case Based Reasoning ...
  • Myint, Khaing Mar lar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The World Wide Web information grows explosively in the Internet and people encounter problem to pick some correct things from the overwhelming set of choices. The recommender systems help them choose something they actually ...
  • War, Nu; Lwin, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electroencephalogram (EEG) signal is an important source of information for knowing brain processes. To interpret the brain activity, Matching Pursuit Based EEG signal classification is proposed. This system includes three ...
  • Wai, Khin Su Su; Myint, Julia; Yee, Tin Tin (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Hadoop distributed file system (HDFS) was originally designed for large files. HDFS stores each small file as one separate block although the size of several small files is lesser than the size of block size. Therefore, ...
  • Zin, Moh Moh Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the development of computer and expanding its use in different areas of life and work, the issue of information security has become increasingly important. The art of sending and displaying the hidden information ...
  • Phyu, Phyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, people widely use computer networks to communicate from one place to another. Security is needed to protect data from hacker. Cryptography is one of the primary ways to do the job. In cryptography, encryption is ...
  • Zan, Thu Thu; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural disaster cannot be prevented, but its impacts can be eliminated or reduced. Mobile devices are the most effective and convenient communication tools which are not restricted by time and place. In this paper, ...
  • Oo, Zin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Electronic clocks have predominately replaced the mechanical clocks. They are much reliable, accurate, maintenance free and portable. In general, there are two kinds of electronic clocks. They are analog clock and ...

Search Repository



Browse

My Account