Browsing by Title

Sort by: Order: Results:

  • Thuzar, Hla; Tun, Khin Mar Lar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Finding graph isomorphism and sub graph isomorphism is an important problem in many applications which deal with data modelled as graphs. Graphs can represent biological networks at the molecular, protein, or species ...
  • Tinzar, Chu (University of Computer Studies, Yangon, 2019-03)
    Image search is more efficient for managing a wide range of image databases. Content-based image retrieval (CBIR) is one of the image retrieval techniques in which users use the visual characteristics of images such as ...
  • Mon, Yi Yi; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Content-based image retrieval (CBIR) system retrieves relevant images based on their contents such as color, texture, shape, volume, spatial constraints and etc. In this paper, a CBIR system is implemented by using ...
  • Kyi, Yin Yin; San, Ni Ni (CULI.LITU.LATU International Conference 2018, Thailand, 2018)
    This proposed paper focuses on some practical ways of generating students’ interest through content-based teaching. It is “Interest” that is essential in teaching/ learning a foreign language like English. The use ...
  • Aye, Kyar Nyo; Thein, Ni Lar (Ninth International Conference on Computer Applications (ICCA 2011), 2011-03-02)
    The Internet is a huge collection of data that is highly unstructured which makes it extremely difficult to search and retrieve valuable information. Due to the massive number of unstructured data, multimedia search ...
  • Soe, Thinn Lai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This system proposes an indexing structure that is built on the basic context document by using semantic suffix tree clustering and context ontology. Context is any information that can be used to characterize the situation ...
  • Yee, Thiri The` Wut (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The proliferating numbers of smartphone applications which access device’s functionalities and resources such as GPS, SMS etc imposes security challenges. In the meantime, the existing security and access control mechanism ...
  • Yee, Thiri The` Wut (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The revolution of mobile phones era has brought the innovative smartphones technology. As a result, research addressing information access in smartphones environment has proliferated. The important feature in security ...
  • Win, Saw; Myint, Zaw Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper use Contract Net Protocol based on multiagent system for purchasing car system. Normally , buyer look for desire car with search engine or buyer must go every Industrial Zone or Company (produce jeep car) ...
  • Zame, Sai Yee; Han, Thwe Mu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Architectural advances of modern systems have been added with control complexity, requiring significant effort in both design and verification. The control is the main part of the modern system. In modern system, it has ...
  • Moe, Khin Wai; Thein, Naychi Lai Lai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper describes the mobile agent-based music selection that generates dynamic playlist based on suggestions from multiple users and presents the design and development of music selection service which is implemented ...
  • Soe, Aye Aye; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes ...
  • Chit, Cherry; Htwe, Latt Latt (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web services based business processes are generally composed of invocation to internal business processes outsourced by loosely coupled providers [4]. A key requirement for the success of web service-based integration of ...
  • Wai, Khin Htar; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Data warehousing technology aims at providing support for decision making for operational data. Defining a data warehouse for data stored in XML (Extensible Markup Language) format should be addressed as various org ...
  • Ko, Tay Zar Ko; Thein, Yadana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper proposed a system that can convert Myanmar Portable Document format to machine editable word document with format. It uses Myanmar Intelligent Character Recognition (MICR) to recognize character. MICR is one ...
  • Lwin, Myint Myint; Nyunt, Thi Thi Soe; Yuzana (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data Exchanging is one of the most important sections in Web Application. XML is flexible and platform independent which provide for data exchanging. Most of the features such as information exchanging and information ...
  • Htwe, Zin Win Nge Nge; Lwin, May Thu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, a logo is the visual representation and forms the foundation of company and organization. Most of the companies want their logos are private and detect copyright rules. They do not want the logos of their companies ...
  • Oo, Mi Khine (University of Computer Studies, Yangon, 2022-04-21)
    The emergence of internet technology provides access to an endless supply of data, information and knowledge to many different areas. Since the amount of digital information has been increased rapidly day by day, ...
  • Oo, Mi Khine; Khine, May Aye (IEEE 7th Global Conference on Consumer Electronics (IEEE GCCE 2018), Nara, JAPAN, 2018-10)
    Efficient extraction of useful information is a rising problem in Big data, since the amount of information being gathered across various domains grows with an increasing rate. So, it takes more time to understand ...
  • Mon, Cho Thet; Nyo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The maintainability of any software system is quantified in terms of Maintainability Index (MI). Many research papers used MI as Maintainability indicator to validate and predict the maintainability of their proposed ...

Search Repository

Browse

My Account