UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Lynn, War War; Tun, Khin Nwe Ni (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Web-based application is currently a hot research and development area. Thousands of applications have been made available on the Web, but the problem is that most of them are nothing more than a network of static ...
  • Phyu, Myat Pwint; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today’s storage systems have a major issue for the long-term storage of massive amounts of unstructured data. Availability and reliability are the basic properties of the most storage system. Replication which is the ...
  • Zar, Myat Thu; Khin, Thuzar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Fuzzy logic is a powerful way problem solving with a myriad of in embedded control and information processing and provide a remarkably simple way to draw finite solution from vague, imprecise information. Fuzzy sets allow ...
  • Han, Nway Nway; Thida, Aye (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Word alignment is a key task for every innovative statistical machine translation (SMT) system. An alignment is the arrangement of two or more alignments between the parallel sentences. The problem of word alignment in SMT ...
  • Lwin, Hnin Thant; Mya, Aye Pa Pa (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, information system has been developed and played key role in live of human beings. By applying the developme nt of information system, user can search the desired information from the inter net . However, user ...
  • Vung, Hau Dim; Kyi, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    File systems are central parts of any modern operation system, and are expected to be both fast and exceedingly reliable. Network file System (NFS) is one of the components in the distributed file system. This paper ...
  • Thet, Yi Mon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, information dissemination applications are very popular and much of the data exchange over the Internet. Existing XML filtering techniques based on a publish/subscribe model on highly structured data marked ...
  • Aung, Nay Win; Thein, Thin Lai Lai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The hazard information and the timely rescue performance are considered as the main elements to reduce the risk of road traffic accidents since the rate of highway accidents significantly increased. In this paper, it ...
  • Thike, Linn Linn; Thein, Thin Lai Lai (ICCA, 2021-02-25)
    Local Ternary Pattern (LTP) is an extension of Local Binary Pattern (LBP), which is known as a standard textural descriptor for various recognition systems. There are a lot of usages of LBP and LTP in the variety of pattern ...
  • Tow, Naw April (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In real world, there are many systems or classification such as smell, light, temperature, speed. This paper presents vehicle speed classification and PIC microcontroller is used to classify as very high speed and high ...
  • Khaing, Hnin Su; Thein, Thandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With widespread availability of low cost GPS devices, it is becoming possible to record data about the moving objects on a large scale. The analysis of moving objects trajectory data is a critical component in a wide range ...
  • Soe, The` The` (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the application of Natural Language Processing (NLP), phrase identification is one of the important roles for machine translation system. This paper proposed Myanmar Verb Phrase identification Algorithm and Morphological ...
  • Marlar, Juli; Soe, Khin Nyein (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Collaborative filtering works to aggregate ratings or preferences on items; discovers user profiles learning from user’s historic rating record; generates a new recommendation on a basis of inter-pattern comparison. ...
  • Shein, Yu Li (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The role of audio in the context of multimedia applications involving video is becoming increasingly important. In this paper, an approach to automatic segmentation and classification of audiovisual data based on audio ...
  • Htet, Thu Thu; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Steganalysis, the method to detect steganographically embedded hidden messages in digital data, has received an increasing interest in recent years. Although significant research efforts have been devoted to develop ...
  • Htet, Thu Thu; Mya, Khin Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Information hiding in video streams with the development of network and multimedia technologies has played an important role in the steganographical field, and correspondingly video stegnanlysis techniques are catching ...
  • Aye, Tin Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The explosion of data , its criticality , and business and education ‘s growing dependency on digital information are leading to larger and more complex information storage environments that increasingly combating to ...
  • Khaing, Nwe Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The recent developments focus on context awareness and information presentation to individual or group of visitors. Any visitors will not interest too long on the road, they want to take the shortest tour for his desired ...
  • Hlaing, Yimon; Aye, Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A method for enabling to obtain access via a microphone without typing password in login page is described. Voice recognition is the task of determining the identity of a person from his or her voice. Voice verification ...
  • Tun, Tar Yar Myo (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Speaker independent speech recognition is important for successful development of speech recognizer in most real world applications. This paper emphasizes speaker independent based on voice conversion usinga pitch ...

Search Repository



Browse

My Account