UCSY's Research Repository

Browsing Faculty of Information Science Collection by Title

Browsing Faculty of Information Science Collection by Title

Sort by: Order: Results:

  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Moe, Myint Myint; Oo, Khine Khine (Proceedings of the Tenth International Conference on Science and Engineering (ICSE 2019), 2019-12-07)
    Test-driven development (TDD) is a foundation for software evolution but unit tests must be performed before production code. To enhance both external code quality and programmers’ productivity can be insisted on the ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Phwe, Phyu Sin; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data Warehouse and OLAP processing is one of the powerful tools for knowledge discovery in large complex data. Data warehouse provides online analytical processing (OLAP) tools for interactive analysis of multidimensional ...
  • Khine, Wai Wai; Thein, Thinn Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Collaborative recommender systems allow personalization for e-commerce by exploiting similarities and dissimilarities among users' preferences. This paper presents an approach to using data mining for e-commerce. It applies ...
  • Mhon, Gant Gaw Wutt; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Web usage mining is the discovery of user access patterns from Web usage logs. The paper presents two XML (Extensible Markup Language) 1.0 applications and a web data mining application which utilizes it to extract web ...
  • Kham, Nang Saing Moon; Maw, Sis Hmue (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    All around the world, people experience delays due to bad traffic conditions and finding the best possible roads in road network from given source to given target location is an everyday problem. Graph database technology ...
  • Mon, Su Su; Oo, Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A distributed database is a database with its data elements stored at several sites of a computer network. Certain data items may be redundantly stored at more than one site for reliability reasons. A replicated database ...
  • Nyaung, Dim En; Thein, Thin Lai Lai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated ...
  • Zan, Hnin Wai; Thein, Thin Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents information of most famous Bagan pagodas and the similar information of pagodas among the famous Bagan pagodas by using Apriori Algorithm. Nowadays, people are quite busy as they are occupied with their ...
  • Tin, Lwin Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Information hiding technique is becoming a research hotspot in information security, and will be widely used to national security, e-commerce, egovernment, copyright protection and covert communication. This paper ...
  • Khaing (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Non-Governmental organizations (NGOs) have a significant role in the development of the society because they play a vital role in the interest of general public. There are many problems faced by those NGOs regarding ...
  • Soe, Nyein Chan; Thein, Thin Lai Lai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Road traffic congestion or jam is main problem in urban area of both developing and developed countries. In order to solve this problem, traffic congestion states of road networks are estimated so that congested road ...
  • Maw, Myint Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior… It is a disciplined way to clean up code that minimizes the chances ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Today, Hyper-Heuristic is not new in AI Field. It is an emerged search technology to select or generate (new) low level heuristics for combinatorial optimization problem and has been applied in many problem domains: personal ...
  • Thu, Yin Yin; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The explosive growth of location-detection devices, wireless communications, and mobile internet has resulted in the realization of locationbased services as commercial products and research prototypes. Unfortunately, ...
  • Kyaw, May Thu; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The increasing popularity of smartphones and tablets has introduced Android malware which is rapidly becoming a potential threat to users. A recent report indicates the alarming growth rate of Android malware in which ...
  • Zune, Sheilar; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Database security and integrity are essential aspects of an organization’s security posture. Database security is the system, processes, and procedures that protect a database from unintended activities. It is important ...
  • Khaing, Myo; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A central problem in machine learning is identifying a representative set of features from which to construct a classification model for a particular task. A good feature set that contains highly correlated features ...

Search Repository



Browse

My Account