Browsing by Title

Sort by: Order: Results:

  • Kyaw, Ei Mon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents e-book shopping system with cryptography by using RSA algorithm. Information security is a major issue today for any company or individual who conducts business electronically. Computer applications ...
  • Win, Zin Sandar; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the context of software engineering, the design patterns are reusable solutions to common problems and are one of the key mechanisms for implementing reliable and maintainable software. Design patterns are fundamental ...
  • Aung, Hsu Hmwaye; Myo, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Frequent pattern mining has become an important data mining task because finding such frequent patterns play an essential role in mining associations, correlation and many other interesting relationships among data. This ...
  • Aung, Darli Myint (2012-02-28)
    Facial feature extraction is an essential step in the face detection and facial expression recognition frameworks. To develop a better facial expression recognition system, a good feature extraction method is needed. ...
  • Zaw, Sai Maung Maung; Maw, Aung Htein; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In wireless sensor networks (WSNs), energy is a very scarce resource and has to be managed wisely in order to extend the life of the sensors. Therefore, to be energy-efficient, this paper is presented as hybrid protocol ...
  • Sithu, Mya; Ishibashi, Yutaka; Fukushima, Norishige (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In this paper, we handle joint performance of a networked haptic drum system where two users play a drum set in a 3D virtual space with the same rhythm at the same tempo. In order to improve the interactivity, we propose ...
  • Aye, Khin Thida; Lwin, Ohnmar (University Journal of Science, Engineering and Research( 2019), 2019)
    Basic approaches to radiation protection are consistent all over the world. The international commission on Radiological Protection (ICRP) recommends that any exposure above the natural background radiation should be kept ...
  • Nhway, Ohnmar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Nowadays, Voice over IP (VoIP) is a major and challenging task for communication technology. In this paper, we focus on VoIP which transmits voice over packet switched networks such as LANs or WANs. Adding security ...
  • Kanaishi, Kazuya; Ishibashi, Yutaka; Huang, Pingguo; Tateiwa, Yuichiro (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    By experiment, this paper investigates the effect of the stabilization control with filters to suppress instability phenomena for tele-robot systems with force feedback by using a master-slave relation. As the quality ...
  • Mung, Pau Suan; Phyu, Sabai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Healthcare big data is a collection of record of patient, hospital, doctors and medical treatment and it is so large, complex, distributed and growing so fast that this data is difficult to maintain and analyze using ...
  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Khaing, Myo; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    A novel metric that integrates the correlation and reliability information between each feature and each class obtained from Multiple Correspondence Analysis (MCA) is currently the popular solution to score the features ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • Swe, Myo Myo; Myo, Nyein Nyein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social networking sites have turned out to be extremely well known as of late. Most internet users utilize them to discover new companions, refreshes their current companions with their most recent feelings and thoughts. ...
  • Win, Chaw Su; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Web pages consist of both informative and non-informative content for the users. Web Page Indexing System, Web Page Classification and Clustering System and Web Information Extraction System that help the users to support ...
  • Khine, Su Mon; Nyunt, Thi Thi Soe; Maw, Aye Aye; Min, Soe Soe (Myanmar Universities' Research Conference, 2019-05-25)
    The use of cooperative and active learning approach is an important role for education system. Although the cooperative technique, Jigsaw have been accepted and applied in many countries’ educational environment over ...
  • San, Cho Cho (University of Computer Studies, Yangon, 2019-10)
    Each and every day, malicious software writers continue to create new variants, new innovation, new infection, and more obfuscated malware by using packing and encrypting techniques. Malicious software classification and ...
  • Win, Sandar; Thein, Thin Lai Lai (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    The recognition of 3D human pose from 2D joint location is fundamental to numerous vision issues in analysis of video sequences. Various methods using with skeletal model have been described in past decades, but there ...
  • Oo, Wint War; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. The emergence of real-time applications ...

Search Repository

Browse

My Account