UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In client-server type, due to repeated and potentially faulty usage of long running server is requested by many clients, such software "ages" with time and eventually fails. We show that virtualization promotes a new ...
  • Lwin, Zin Mar; Thaw, Mie Mie (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Brain Computer Interface (BCI) Systems have developed for new way of communication between computer and human who are suffer from severe motor disabilities and difficult to communicate with their environment. BCI let ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Myat, Yin Yin; Mon, Ohmmar Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Pseudorandom Number Generators (PRNGs) are computational algorithms that produce long sequence of random results, which are determined by a shorter initial seed or key. Elliptic curve cryptosystem is a public key cryptosystem. ...
  • Win, Myat Su; Khin, Thet Thet (ICCA, 2021-02-25)
    Essential role of Internet-based communication is the security of information. Classical Cryptography is based on mathematical models and computational complexity to compute the secret key. It does not provide enough ...
  • Aung, Lwin Moe; Nyunt, Thi Thi Soe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    SQL is a special-purpose programming language designed for managing data held in a relational database management system. XQuery is a standardized language for combining documents, databases and Web pages. Among many ...
  • Aung, Yi Yi; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology ...
  • Oo, Nang Phyu Hnin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Rural's people development plays an importance role in a country. The analysis of status of social, commercial of Rural's people is very main status. By using this analysis, fill can the requirement space. So, the statuses ...
  • Htwe, Khin Mar; Naing, Thinn (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper is intended to implement shortest path way of transportation. To efficiently extract knowledge, Depth First Search (DFS), Breadth First Search (BFS), Uniform Cost Search (UCS) algorithms depend on the efficient ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Linn, Thu Zar; Aung, Than Htike (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Association rule mining is widely used in business enterprise to analyze for marketing strategies and its good is to find interesting association or correlation relationship among a large set of data items. With massive ...
  • Wai, Chit Hnin; Soe, Khin Thanda (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Recommender Systems typically use techniques from collaborative filtering which recommend items that users with similar preferences have liked in the past and, also predict new rating by averaging ratings between pairs ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...
  • Yee, Hnin Lai; Myint, Mu Mu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The healthcare system collects large amounts of healthcare data which unfortunately, are not mined to discover hidden information for effective decision making. Discovery of hidden patterns and relationships often goes ...
  • Aung, Hay Mar Su; Pa, Win Pa (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This paper presents a study of comparison on three different machine learning techniques to sentiment analysis for Myanmar language. The fundamental part of sentiment analysis (SA) is to extract and identify the ...
  • Soe, Ei Phyu Phyu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Speech synthesis system is a popular field in natural language processing of computer science for various languages. The process of speech synthesis is to produce the human-like speech from corresponding language and ...
  • Aung, Yu Nandar; Zaw, Ei Phyu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Data Mining is a fast developing field of computer science and technology, which are helpful to enable end users for decision making process. One of the most important data mining processes is that of Association Rule ...
  • Tun, Kyaw Naing; Aye, Zin May; Khaing, Kyaw Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The number of applications for smart mobile devices is steadily growing with the continuous increase in the utilization of these devices. the Installation of malicious applications on smart devices often arises the ...
  • Htun, Myo Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Audio fingerprinting is a smart technology to identify music contents relevant to the query by comparing the content-based hash (fingerprint) of the query to known hashes in the fingerprint database. For a million-song ...

Search Repository



Browse

My Account