UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Cho, Thinn Thinn; Lynn, Khin Thidar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Association rule mining represents a data mining technique and its goal is to find interesting association or correlation relationships among a large set of data items. With massive amount of data continuously being collected ...
  • Paing, Aye Myat Myat (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Deficiency of flexibility and programmability of legacy network architecture has been the concern of many networking admirers for some years. Software defined networking (SDN) is a new emerging concept to logically ...
  • Zin, Ei Phyu; Aye, Nilar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data Mining is the process of analysis of raw data in the database and synthesizing it into information that is useful for effective decision making. Association rule mining finds interesting association or correlation ...
  • Ei, Htet Htet; Lwin, Wai Wai (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Many organizations are being interested in mining association rules from business records because they desire to promotethe benefit from large amount of data that are continuously stored in databases. Discovery of ...
  • Oo, Khine Zar; Tun, Ei Ei Moe (ICCA, 2021-02-25)
    Since 2012, internet usage in the world has grown from a mere 1.8% to 59% in 2020. The numbers of online shopping webs in the world are becoming greater than ever before. People use the internet to access or update reviews. ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Aung, Myat Aye Aye; Pa, Win Pa (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Automatic Speech Recognition (ASR) system is to accurately and efficiently convert speech signal into a text message independent of device, speaker or the environment. Feature extraction is the second component of ...
  • Mon, Tin Lai Lai; Thein, Thin Lai Lai (ICCA, 2021-02-25)
    Interpolation of GPS points is one of the biggest challenges in the world of today. GPS signals may be lost because of many reasons including signal loss and battery loss of the transceiver. Our research work is intended ...
  • Linn, Khaing Wah Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As the use of web is increasing more day by day, the World Wide Web is rapidly growing on all aspects. It is the duty of service provider to provide relevant information to the internet user against their query submitted ...
  • TSUBAKI, Hajime; OGAMI, Takeru; KONDO, Mariko; SAGISAKA, Yoshinori (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Aiming at objective evaluation of L2 (second language) learners' proficiency, we statistically analyzed mispronunciation characteristics of Japanese learners' English speech based on phonetic knowledge. Through automatic ...
  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In client-server type, due to repeated and potentially faulty usage of long running server is requested by many clients, such software "ages" with time and eventually fails. We show that virtualization promotes a new ...
  • Lwin, Zin Mar; Thaw, Mie Mie (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Brain Computer Interface (BCI) Systems have developed for new way of communication between computer and human who are suffer from severe motor disabilities and difficult to communicate with their environment. BCI let ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Myat, Yin Yin; Mon, Ohmmar Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Pseudorandom Number Generators (PRNGs) are computational algorithms that produce long sequence of random results, which are determined by a shorter initial seed or key. Elliptic curve cryptosystem is a public key cryptosystem. ...
  • Win, Myat Su; Khin, Thet Thet (ICCA, 2021-02-25)
    Essential role of Internet-based communication is the security of information. Classical Cryptography is based on mathematical models and computational complexity to compute the secret key. It does not provide enough ...
  • Aung, Lwin Moe; Nyunt, Thi Thi Soe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    SQL is a special-purpose programming language designed for managing data held in a relational database management system. XQuery is a standardized language for combining documents, databases and Web pages. Among many ...
  • Aung, Yi Yi; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology ...
  • Oo, Nang Phyu Hnin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Rural's people development plays an importance role in a country. The analysis of status of social, commercial of Rural's people is very main status. By using this analysis, fill can the requirement space. So, the statuses ...

Search Repository



Browse

My Account