Browsing by Title

Sort by: Order: Results:

  • Phu, Khing Shwe Ye (University of Computer Studies, Yangon, 2022-09)
    Address Resolution Protocol (ARP) is a very popular communication protocol in the local area network (LAN), working under the network layer, as per the open systems interconnection (OSI) model. ARP is used by computers ...
  • Phyu, Ei Ei; Moe, Khin Myat Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The demand of security is getting higher in these days due to easy reproduction of digitally created data. Digitally hide the secret information in some media content like digitized identification card, student’s registration ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Wai, Chit Hnin (University of Computer Studies, Yangon, 2022-06)
    Nowadays, communication is becoming more and more important to keep in touch with family and friends. Computer networks play a key role in this paper. To make this facilitating, Network engineers have used protocols ...
  • Latt, Win Zaw; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Education is an important part of human life and it is also valuable asset for career achievement. Nowadays, people gained certificates from the institution they had learnt and, those graduation documents are presented as ...
  • Mon, Ei Ei; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. The cloud allows users to avoid upfront ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Tun, Khin Myaing Myaing; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is recognized as an absolute need in application development. The healthcare sector deals with very sensitive data, patient’s medical records need to be kept confidential; hence, security is very important. ...
  • Thein, Khin Me Me; Nyunt, Thi Thi Soe; Aye, Kyar Nyo (International Journal of Advances in Electronics and Computer Science (IJAECS), 2017-02)
    In today’s world, real-time data or streaming data can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Big Data is also one of the hottest research ...
  • Soe, Naing Thura; Thant, Khin Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Dijkstra’s Algorithm solves the problem of finding the shortest path from a point (the source) to a destination. This problem is sometimes called the single-source shortest path problem. In these days, the world become ...
  • Soe, Thinn Lai (International Journal of Computer, 2013)
    Nowadays, there are so many increasing amount of information within world-wide web. For these increasing amounts of information, we need efficient and effective index structure when we have to find needed information. ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    XML (eXtensible Markup Language) and its schema language are becoming a primary data exchange format on the current web. In the next generation of the Semantic Web, the drawbacks of XML and its schema are appeared. ...
  • Tun, Thu Thu; Htoo, Nay Zar Chi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The Web is moving toward a collection of interoperating Web Services. Achieving this interoperability requires dynamic discovery of Web Services. This paper will develop a service repository that extends the UDDI registries ...
  • Nwe, San San; Kham, Nang Saing Moon (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social media has quickly become popular as an important means that people, organizations use to spread information of divert events for various purposes, ranging from business intelligence to nation security. However, the ...
  • Tun, Nyan Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Information and access to information is important in modern society. Network security is necessary to counter the threats and make network safe to use. There are some methods to prevent eavesdropping or falsification ...
  • Nwet, Khin Thandar; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper describes an alignment system that aligns Myanmar-English texts at the sentence and word level in parallel text. Sentence and word level alignment is the identification of the corresponding sentence and word ...
  • Takada, Kazuma; Nakajima, Hideharu; Sagisaka, Yoshinori (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Aiming at communicative speech synthesis, we analyzed sentence-final prosody characteristics through subjective impression on constituting lexicons. Since Japanese sentence-final particles and postpositionals are ...
  • Zaw, Wai Phyoe; Hlaing, Zar Chi Su Su (ICCA, 2021-02-25)
    Nowadays, a lot of information is valuable for people who want to predict and decide the market or economic or political or many different areas. Because of the information age, customers are also no longer interested in ...
  • Chan, Wint Nyein; Thein, Thandar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-17)
    Nowadays, Twitter Sentiment analysis has become popular as it helps the organization to determine marketing strategy by providing public opinions. Efficient techniques to collect a large amount of Twitter stream data ...
  • Nain, Win Theingi; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Mining opinions and sentiments from natural language is challenging, because it requires a deep understanding of the explicit and implicit, regular and irregular, and syntactical and semantic language rules. Sentiment ...

Search Repository

Browse

My Account