Browsing by Title

Sort by: Order: Results:

  • Soe, Nwe Nwe; Htay, Win (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Neural network ensemble techniques have been shown to be very accurate classification techniques. However, in some real-life applications, a number of classifiers required to achieve a reasonable accuracy is enormously ...
  • Hlaing, Nwe Ni; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Spam is a key problem in electronic communication, including large-scale email systems. Classification of spam emails is a significant operation in email system. The efficiency of this process is determined by many ...
  • Khaing (ICCA, 2021-02-25)
    An Enterprise Resource Planning (ERP) application was used predominately in manufacturing sector and hardly used in nonprofit organizations. Using ERP systems in nonprofit organizations has special features and unique ...
  • Myint, Moe Moe; Kyu, Khin Kyu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Image information is routinely used in many applications. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays an important role in protecting ...
  • Oo, Nandar Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Myanmar language input method editor (IME) is widely used in embedded system of today Android portable devices such as mobile phones, tablets and e-books readers etc. as an important part of human-computer ...
  • Win, Kyaw San; Kyu, Khin Kyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. ...
  • Myint, Theint Zarni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent research has demonstrated the strong performance of hidden Markov models (HMM) applied to information extraction that the text of populating database slots with corresponding phrases from text documents. Hidden ...
  • Tin, Hlaing May (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Recently, most IT organizations are transforming their data centers to smaller virtualized ones with the help of server virtualization. In virtualized servers, multiple applications are consolidated into a physical server ...
  • Su, Hla Myo; Maw, Aung Htein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Video streaming is becoming the most popular content delivery mechanism for media services. Multiple video streams will compete for bandwidth, thus leading to degrade performance and impacting the received quality of ...
  • Tun, Thazin; Wai, Khaing Khaing; Khaing, Myint Soe (ICCA, 2021-02-25)
    Extracting valuable information from data is a challenging task. Many times, because of massive, redundant, incorrect and noisy outcomes, an analyst will end up with an incorrect classifier. It can also be due to misinterpreting ...
  • Lee, Junhyuk; Moon, Hichan (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In many Orthogonal Frequency Division Multiplexing (OFDM)systems, pilots are periodically transmitted for channel estimation. In this paper, we investigate a simple noise power estimation algorithm based on the time-domain ...
  • Soe, Nang Kham; Yee, Tin Tin; Htoon, Ei Chaw (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Apache Hadoop is an open-source software framework for distributed storage and distributed processing of very large data sets on computer clusters built from commodity hardware. The Hadoop Distributed File System (HDFS) ...
  • Win, Htet Htet; Nway, Zon Nyein (National Journal of Parallel and Soft Computing, 2019-03)
    Android applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...
  • Win, Htet Htet (University of Computer Studies, Yangon, 2019-01)
    Information applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...
  • Win, Zin Mar; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Fingerprint-based identification is one of the core methodologies for personal identification. It remains a reliable, efficient and commonly accepted biometric. We propose a fingerprint recognition system for identifying ...
  • Hlaing, Thazin; Pearl (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Personalization is a new system development approach for designing information systems that change configurations based on each user's needs and preferences. If it is possible to recommend products to customers’ liking at ...
  • Linn, Khaing Wah Wah; Thwin, Khin Lay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Personalization systems compute recommendations based on user information. There are many kinds of personalization techniques such as collaborative filtering, content-based filtering, rulebased approach etc. Collaborative ...
  • Win, Lai Lai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Web search has become amazingly powerful in its ability to discover and exploit nearly any kind of information that comprises the web. However, as powerful and large as current web search engine are , stilled limited ...
  • Mon, Aye Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Spell checker is an essential component of word processing, Machine Translation system and Office Automation system. Myanmar Pronunciation and orthography has differences because spelling is often not an accurate reflection ...
  • Maung, Kyaw Kyaw (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Converting system of phonetics transcriptions to Myanmar text is intended to contribute as a portion of speech to text system of Myanmar language. In Myanmar language, the spoken language may be different with the ...

Search Repository

Browse

My Account