Browsing by Title

Sort by: Order: Results:

  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Win, Htwe Pa Pa; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image enhancement processing step is the basic crucial part of the OCR system as the recognition accuracy of OCR systems greatly depends on the quality of the input text image. Most of the OCR systems, especially Myanmar ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Htwe, Ah Nge; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image resampling is a process which change the size of an image. It generates output image of the specified dimension with the help of the interpolation techniques. The up-sampled images are lost fine detailed information ...
  • Oo, Shwe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Content-based image retrieval (CBIR) is the uses of visual features of the image, such as color, texture, shape, match the query image and database, return similar image to the user. Color is the most significant feature ...
  • Htwe, Ah Nge; Nge, Mi Mi (International Conference on e-Business (iNCEB), 2009-10)
    Image zooming is a vital role in image processing. The zoomed images can be distorted because of blocky or jaggy effects. Sometimes, there is a problem to define the content of image or photo. The distorted image is needed ...
  • Moe, Myint Myint; Oo, Khine Khine (Proceedings of the Tenth International Conference on Science and Engineering (ICSE 2019), 2019-12-07)
    Test-driven development (TDD) is a foundation for software evolution but unit tests must be performed before production code. To enhance both external code quality and programmers’ productivity can be insisted on the ...
  • Thant, Lwin May; Phyu, Sabai (ICCA, 2021-02-25)
    In a medical problem, investigation of powerful new tools is involved in essential role of high-throughput sequencing technologies. Microarray data sequencers produced a large and complex sets of data for the advancement ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Aye, Saw Mya; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Voice over Internet Protocol (VoIP) is one of the quickest developing Internet services and steadily replaces traditional telephony. VoIP application provides a means of transmitting voice communication over an IP based ...
  • Zar, Aung Yar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In the world of today, computer and Internet have become part of our everyday lives. Security for data and information are very important. Secure communication is an intrinsic requirement for many popular online transactions ...
  • Win, Tint Lwin Lwin; Naing, Thinn (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    “Dynamic Database Access and Storage System (DDASS)” provides its customers seamless mechanisms to create, and access their databases at the hosted site that are simulated on private cloud infrastructure. Usually the ...
  • Win, Seint Seint; Lwin, Nyein Nyein (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today’s search engines are equipped with specialized agents known as Web crawlers (download robots) dedicated to crawling large Web contents on line. Crawlers interact with thousands of Web servers over periods extending ...
  • Phwe, Phyu Sin; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data Warehouse and OLAP processing is one of the powerful tools for knowledge discovery in large complex data. Data warehouse provides online analytical processing (OLAP) tools for interactive analysis of multidimensional ...
  • Phue, Wai Mon Mon; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In today’s world, parallel processing framework is a widely used for the applications which need too much processing power. As an example, the basic requirement of security problems is to permute the input text into ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Win, Eaint Mon; Aye, Khin Myo (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    With the rapid development particularly in online industry, the amount of the online users is also dramatically increased. To be reliable and secure on the user’s process, multi-agent systems have become an enormous and ...
  • Oo, Khaing Wai; Yuzana (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Auctions are a fundamental mechanism to automate negotiations in electronic commerce. This paper presents agent-based mechanism for autonomous multiple criteria reverse English auction. In the multiple criteria auctions, ...
  • Mon, Khaing Zar; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The rapid growth of on-line information has created a surge of interest in tools that are able to extract information from on-line documents. Information extraction (IE) is the process of pulling desired pieces of ...

Search Repository

Browse

My Account