UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Aung, Su Wit Yi; Khaing, Soe Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Land use and land cover change has become a vital component in current strategies for managing natural resources and monitoring environmental changes. Analyzing the changing of hydrological area, vegetation area and ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing paradigm contains many shared resources such as infrastructures, data storage, various platforms and software. In cloud storage service, consistency not only influences the performance and availability ...
  • Myo, Zin Mar; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Long Term Evolution (LTE) is a mobile network that operates completely in packet domain. Due to the variation of radio condition in LTE, the obtainable bit rate for active users will vary. The two factors for radio ...
  • Phyo, Thazin; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper is presented the mining association rules among items in a large database of sales transactions. The mining of association rules can be mapped into the problem of discovering large itemsets which appear in ...
  • Ko, Su Linn; Aye, Hnin Hnin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A large number of expert systems require the use of forward chaining or data driven inference. Rulebased systems are really only feasible for problems for which any and all knowledge in the problem area can be written ...
  • Nwe, Thiri; Hlaing, Swe Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Analyzing the program conditional control flow the important technique using in program execution. Software errors are often caused mostly due to the complexity of software, programming errors, time pressure and changing ...
  • Tun, Hlaing Nwe; Win, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining is the process of digging trough large files and databases to discover useful, non-obvious and often unexpected trends and relationships. Association rules are popular representations in data mining. It finds ...
  • Khaing, Kyaw Thet; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, ...
  • Thazin, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast progression of information exchange in electronic way, security is becoming more important in information transmission as well as in storage. To protect the confidential data from unauthorized access, several ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data Centre (DC) administrators try to delivering performance guarantees while managing resources for utilization in terms of reducing cost. With the advent of server consolidation provided by virtualization technology, ...
  • Htun, Phyu Thi; Win, Mya Thidar Myo; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many Intrusion Detection System (IDS) based on signatures. If a new attacks, which by definition cannot be in the database of signatures is coming, those system cannot detect. The attackers will have a new way ...
  • Win, Mya Thidar Myo; Htun, Phyu Thi; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. Current ...
  • Aung, Khin Zezawar; Myo, Nyein Nyein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Opinion mining, which is also known as Sentiment Analysis, is an interesting field to analyze people’s opinions, sentiments, attitudes and appraisals. There are several approaches to analyze the textual data using sentiment ...
  • Wai, Khaing Phyo; Thu, Ei Ei (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Social network analysis (SNA) is the study of social networks to understand their structure and behavior. The study of the social networks is the possibility of collecting web log data. The data used for analyzing ...
  • Zaw, Su Mon; Hlaing, Swe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper basically deals with the availability of client programs on mobile devices that can invoke the remote execution of data mining task. By implementing mobile Web Services, remote users are allowed to execute ...
  • Tun, A Me (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data warehousing and online analytical processing (OLAP) are essential facilities for data analysis tasks supporting a user’s decision in a business. Data warehousing approach is to integrate information and heterogeneous ...
  • Hlaing, May Me Me; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the process of analyzing large data sets in order to find patterns. Mining frequent patterns is a fundamental and crucial task in data mining problems. The association rule mining is needed in order to ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The android speech recognizer acquires speech at run time through a microphone and processes the sampled speech to recognize the uttered text. But the output texts do not match with users’ data because English and ...
  • Cuong, Nguyen Phu; Nedev, Zhivko; Tin, Duong Trung; Tu, Le Anh (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    We describe the design and implementation of a computer application that can search for a small size balanced set modulo p, with p prime. Additionally, the application can”analyze” and ”visualize” any given balanced set ...
  • Soe, Yan Naung; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Mobile devices have gained tremendous popularity over the last few years. The most popular usage is the smart phones. They are accepted and admired by many mainly because they are capable of providing services such as ...

Search Repository



Browse

My Account