Browsing by Title

Sort by: Order: Results:

  • Phyo, K-zin (University of Computer Studies, Yangon, 2019-11)
    Emergency events never happen with prior alert and notification, and can damage people and cause permanent loss as consequences. For that reason, how to report the emergency service organizations, to distinguish the ...
  • Chaw, Hnin Thiri; Thuzar, Myat; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In recent year, the transportation networks are becoming more and more complex and navigation services are increasingly necessary for the people living in the modern society. One of the requirements in the cities of ...
  • Parami, Ananta (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, as the consumer market becomes quite competitive and challenging, to gain the customer’s satisfactions is vital. Therefore, Decision Support System would play an important role in mass production line. ...
  • Aye, Thaw Tar; Yee, Myint Myint (National Journal of Parallel and Soft Computing, 2019-03)
    Operation Research (OR) is an interdisciplinary branch of applied mathematics and formal science that uses method like mathematical modeling, statistics and algorithms to arrive at optimal or near optimal solution to ...
  • Mar, Aye Aye; Aung, Nang Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Dijkstra algorithm among the shortest-path algorithms is to solve the shortest-path problem. Dijkstra’s algorithm is probably the best-known and thus most implemented shortest path algorithm. It is based on a priority queue ...
  • Wutyi, Khaing Shwe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Linear Programming (LP) is a class of mathematical programming models concerned with the efficient allocation of limited resources to specified activities with the objective of meeting a desired goal. Linear ...
  • Win, Soe Theint Theint; Aung, Khin Sandar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Clustering (or cluster analysis) aims to organize a collection of data items into clusters, such that items within a cluster are more “similar” to each other than they are to items in the other clusters.Clustering is ...
  • Tha, Phone Kyi; Win, Su Thawda (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    In a capacitated pipeline network, a problem that commonly occurred is finding maximum flow. It is finding the best amount of flow of flow rate of entity in the pipeline network. Water supply network is a kind of capacitated ...
  • Min, Nandar Win; Hlaing, Aye Nandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Obtaining important pages rapidly is very useful when a crawler cannot visit the entire Web in a reasonable amount of time. One approach is using focused crawler because it tries to download only pages with pre-defined ...
  • Phyu, Nan Khaing Pwint; Aung, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Outlier analysis is that the user do depends on the kinds data they have. An outlier is a data value, that has a very low probability of occurrence that is, it is unusual. There are three kinds of outlier detection in ...
  • Hlaing, Wint Wah; Khin, Tar Tar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Outlier detection is an important task in data mining activities and has much attention in both research and application. A value that lies outside which is much smaller or larger than most of the other value in a set of ...
  • Htwe, Hsu Mon; Phyu, Aye Lei Lei (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Outliers are the set of objects that are considerably dissimilar from other values in a random sample from a population. Outliers are important because they can change the results of data analysis. In this paper, ...
  • Htwe, Ei Ei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Clustering is the process of grouping a set of objects into classes or clusters so that objects within a cluster have similarity in comparison to one another, but are dissimilar to objects in other clusters. Clustering ...
  • Win, Eaint Mon; Khine, May Aye (ICCA, 2021-02-25)
    The study of real networks like social network has been increasingly interested in community research area. With this study, overlapping community detection plays an important role in studying hidden structure of those ...
  • Win, Eaint Mon (University of Computer Studies, Yangon, 2023-09)
    Community structure is one of the main structural features of networks and detecting overlapped community structure is an important field in social network analysis. There are many methods for finding non-overlapping ...
  • Frank, Lars (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In central databases the consistency of data is normally implemented by using the ACID (Atomicity, Consistency, Isolation and Durability) properties of a DBMS (Data Base Management System). In practice, it is not ...
  • Htun, Nay Win; Ko, Lin Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents a feature-based system which utilizes domain knowledge to segment and classify scanned image documents. Documents usually consists of a mixture of text and image. Text block possesses an interesting ...
  • Maung, Tin; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper presents PALBS, a preferenceaware location-based services system. PALBS provides scalable personalized location-based services to users based on their preferences. Unlike existing location-based service ...
  • Kyu, Khin Kyu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper is represented for information security by using image steganography method on palette-based image. The palette image based steganography is used LSB encoding procedure. Steganograpyh is the art of hiding ...
  • Sung, Hong Gye; Jeong, Won Cheol; Kim, Sung Yoon (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    To analyze the emissions of a turbulent lean premixed Methane-air combustor, a level set Gequation method has been implemented in the Large Eddy Simulation (LES) framework using parallel personal server. The server ...

Search Repository

Browse

My Account