UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Moet, Moet (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Clustering (or cluster analysis) aims to organize a collection of data items into clusters, such that items within a cluster are more “similar” to each other than they are to items in the other clusters. There are many ...
  • Win, May Thu Zar; Maw, Aung Htein; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Segment Routing (SR) is an emerging technology to enforce the effective routing strategies without relying on signaling protocols. SR only needs to define the path information through the network at the ingress device ...
  • Aung, May Aye Chan; Wai, Myat Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Data security is the challenging issue in todays world that touches many areas using computer communication. Recent cyber security attacks have certainly played with the sentiments of the users [9]. Encryption is one ...
  • Kim, Myong Hee; Kim, Chang-Soo; Rhee, Kyung-Hyune; Park, Man-Gon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We propose a statistical estimation framework to assess energy saving effectiveness of the sensor nodes which have been deployed in a rough physical environment and consisted in a wireless sensor network by use of ...
  • Lynn, Nay Chi; Aung, Su Su (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Making use of search engines is most popular Internet task apart from email. Currently, all major search engines employ web crawlers because effective web crawling is a key to the success of modern search engines. Web ...
  • Mon, Ei Ei; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electronic mail is used daily by millions of people to communicate around the world and it is a critical application for many businesses. Because of the fame of emails, the attackers utilize it to gather the sensitive data. ...
  • Aye, Yin Mon; Nwe, Khine Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining is a process that has a variety of data analysis tools to discover patterns and relationships in data that may be used to make valid predictions. Classification is the process of finding a set of models that ...
  • Khaing, Khwar Nyo; Yee, Myint Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper implements suggestion for matriculation examination result using decision tree induction algorithm. To be a well-developed human society, there must not be a great gap among the youths and so it is very necessary ...
  • Thida, May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Computer-controlled systems are of great interest in today’s world. These systems have spread into many areas of applications, such as environmental protections, military affairs and factory controls. Computer-controlled ...
  • Lin, Nu Nan Dar; Thu, Ye Kyaw; Matsumoto, Mitsuji; Urano, Yoshiyori (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, Ontology is becoming increasingly widespread in research field and application area of computer science. Ontology is used not only in semantic web but also in database and applications that need to share domain ...
  • Aung, Yi Yi; Thu, Ei Ei (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The World Wide Web (WWW) is a rich source of information and continues to expand in size. The complexity at the WWW makes it difficult for data mining. Before the Web, finding information meant asking a friend or an ...
  • Wai, Khaing Phyo; Aung, Yi Yi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Web log data or click stream data has a lot of valuable information about a web site or web site visitors’ online behavior. Web usage analysis or web log mining is the process of capturing, analyzing and modeling the ...
  • Thu, Ye Kyaw; Pa, Win Pa; Finch, Andrew; Hlaing, Aye Mya; Naing, Hay Mar Soe; Sumita, Eiichiro; Hori, Chiori (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Grapheme-to-Phoneme (G2P) conversion is a necessary step for speech synthesis and speech recognition. This paper addresses the problem of grapheme to phoneme conversion for the Myanmar language. In our method, we propose ...
  • Sin, Yi Mon Shwe; Soe, Khin Mar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The paper presents the first large scale evaluation of the quality of Syllable-based Neural Machine Translation (Syllable-NMT) system for Myanmar-English pair. Neural Machine Translation (NMT) system has reached ...
  • Soe, Nwe Nwe; Htay, Win (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Historical handwritten palm leaf manuscripts are very informative documents from which we can learn precious and various experiences from them. This paper presents the character segmentations of historical handwriting from ...
  • Thant, Win Win; Htwe, Tin Myat; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The task of identifying syntactic components is one of the fundamental tasks in natural language processing. The syntactic structure of every language is organized in terms of subject, object, and other grammatical ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In today digital age, there are more demands to improve techniques for information security. One of the solutions is steganography, hiding sensitive information within innocentlooking cover media. In this paper, we ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...
  • Win, Thidar; Kyi, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    EXtensible Markup Language (XML) is a self-describing meta-language and fast emerging a standard for Web data exchange among various applications. XML is also a new technology that attracts a great deal of interest and ...
  • Phyu, Thin Aye; Kham, Nan Si (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Decision tree algorithm is a method for approximating discrete valued target functions, in which the learned function is represented by a decision tree. A major challenge facing healthcare organizations (hospitals, medical ...

Search Repository



Browse

My Account