Browsing by Title

Sort by: Order: Results:

  • Oo, Myat Nandar (University of Computer Studies, Yangon, 2019-01)
    In the era of Big Data, Hadoop Big Data Platform has been embraced by both individuals and organizations as it can offer cost-effective, large capacity storage and multi-functional services on a wide range of devices. ...
  • Oo, Myat Nandar; Thein, Thandar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays Hadoop becomes a popular business paradigm for managing and storing the Big Data. It is possible for malicious users to abuse Big Data storage system and the number of illegal usages on them has increased ...
  • Lwin, Htar Htar; Aung, Wai Phyo (Proceedings of the First University Research Conference on Science and Engineering, 2020-01-23)
    This paper aims to analyze digital forensics of specific Android mobile financial applications such as m-banking and m-pay applications used in Myanmar. Some applications may store customer’s credentials on the phone’s ...
  • Aung, Nay Aung; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Cloud storage forensics has recently emerged as a salient area of inquiry. One area of difficulty is the identification and acquisition of potential data when disparate services can be utilized by criminals. There is ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Web is one of the most popular and richest sources of information. The source of data for a Web page is generally a relational database which has been recognized as a key factor in generating huge amounts of data ...
  • Yar, Kay Thi (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the ...
  • War, Nu (2009-12-30)
    At the core of the presented system is a highly robust fingerprint extraction method which enables searching a large fingerprint database with only limited computing resources. Requirements for such systems include ...
  • Oo, May Mar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, network – oriented computing environments require high – performance, distributed database systems that can satisfy both the data consistency control of replica management and data storage requirements ...
  • Htwe, Thandar Su Nge (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Grid has emerged recently as an integration infrastructure for sharing and coordinated use of diverse resources in dynamic, distributed environment. OGSA-DAI (Open Grid Services Architecture Data Access and integration) ...
  • Maung, Zin Maung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Myanmar language has long been influenced by the usage of Pali words since ancient times. This study proposes a framework for identifying Pali words in Myanmar text to analyze the influence of Pali words on Myanmar ...
  • Htay, Hsint Hsint; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image inpainting involves filling in part of an image using information from the surrounding area. Applications include the restoration of damaged photographs and movies and the removal of selected objects. A framework for ...
  • Oo, May Mar; Yi, Aye Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to continuous growth of the Internet technology, it needs to establish security mechanism. However, many current intrusion detection systems (IDSs) are rule-based systems, which have limitations to detect novel ...
  • Myint, Ei Ei Pe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Music is the effective communication medium among people. Studying music mood can help in music understanding, music retrieval, and some other music-related applications. This paper presents a hierarchical framework ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital library (DL) research and development has concentrated primarily on collections and on the services to build and access them. And when the large quantity of Myanmar document is getting archived by the digital ...
  • Win, Thinn Thinn (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the fast growth of Semantic Web, more and more Resource Description Framework (RDF) data are created and widely used in Web applications and information systems. Recently, efficient RDF data management on top of ...
  • San, Moe Moe; Win, Khin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The students are becoming more technology oriented and the classroom teaching is changing, therefore it’s changing to enhance. Because of its vast advantages, one of the latest technologies of students’ learning currently ...
  • Phyu, Myat Pwint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As storage systems grow larger and more complex, the traditional block-based file systems cannot satisfy the large workload. More recent distributed file systems have adopted architectures based on object-based ...
  • Aye, Nilar; Naing, Thinn Thu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper proposes a framework to construct a knowledge base by using crowdsourcing approach. The various inputs have been asserted into database interactively by crowd of people via internet. The support of travel ...
  • Tint, Wai Mar; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Effective information architecture (IA) is mapped to the structure of actual human systems. The IA of an information system must be hospitable to change as well. The representation of actual human knowledge is captured by ...
  • Tun, Sandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Frequent itemsets mining leads to the discovery of associations and correlations among items in large transactional or relational data sets. Frequent itemsets mining is market basket analysis. This paper presents to analyzes ...

Search Repository

Browse

My Account