Browsing by Title

Sort by: Order: Results:

  • Htun, Nay Win; Ko, Lin Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents a feature-based system which utilizes domain knowledge to segment and classify scanned image documents. Documents usually consists of a mixture of text and image. Text block possesses an interesting ...
  • Maung, Tin; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper presents PALBS, a preferenceaware location-based services system. PALBS provides scalable personalized location-based services to users based on their preferences. Unlike existing location-based service ...
  • Kyu, Khin Kyu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper is represented for information security by using image steganography method on palette-based image. The palette image based steganography is used LSB encoding procedure. Steganograpyh is the art of hiding ...
  • Sung, Hong Gye; Jeong, Won Cheol; Kim, Sung Yoon (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    To analyze the emissions of a turbulent lean premixed Methane-air combustor, a level set Gequation method has been implemented in the Large Eddy Simulation (LES) framework using parallel personal server. The server ...
  • Thein, Htet Thazin Tike; Tun, Khin Mo Mo (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In this paper, parallel differential evolution algorithm with multiple trial vectors for training artificial neural networks (ANNs) is presented. The proposed method is PDEA, which is a DE-ANN+ modified by adding island ...
  • Nyein, May Khine; Khaing, Myo (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Graphs are widely used in many applications. Some of the applications that used graph theory are: analysis of electrical circuits, route planning, genetics, social sciences and so on. The system is based on sequential ...
  • Nyunt, Han Su Yin; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Local sequence alignment is widely used to discover structural and hence, functional similarities between biological sequences. Sequence database alignment is among the most important and challenging tasks in bioinformatics. ...
  • Thu, Ye Kyaw; Ding, Chenchen; Utiyama, Masao; Sumita, Eiichiro (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As Myanmar (Burmese) and Japanese share similar syntactic structures, we explore an approach for parsing Myanmar by using Japanese as a pivot. Specifically, we first apply a statistical machines translation (SMT) system ...
  • Aye, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The evolution of World Wide Web as the main information source for millions of people nowadays has imposed the need for new methods and algorithms that are able to process efficiently the vast amounts of data that ...
  • Aung, Thet Sandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents the way to calculate waiting times of patients. Results of patient surveys generally cite access to care and delays in care as sources of dissatisfaction. Delays are expensive, not only in terms of ...
  • Oo, Htun Zaw (University of Computer Studies, Yangon, 2018-08)
    Many organizations use World Wide Web for multipurpose platform during these days. It is very important to understand how a web site is being used by users. Web usage mining also known as web log mining, aims to discover ...
  • Kyaw, May Phyu; Yuzana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such modifies have to express organization specific security ...
  • Zaw, Hnin Thiri; Maw, Aung Htein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    This paper presents path delay based flow rerouting (PDFR) algorithm for traffic engineering in software-defined network (SDN). The goal of PDFR is to reroute the elephant flow from ongoing path to least delay path in order ...
  • Win, Thida (University of Computer Studies, Yangon, 2022-06)
    Peer-to-Peer (P2P) file sharing is a technique of network file sharing. Clients can direct access and share the files to other clients in P2P network. The P2P file sharing system does not require any central server. ...
  • kyaw, Mya Thidar; Soe, Kyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms ...
  • Oo, Myat Cho Mon; Thein, Thandar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Many real world areas from different sources generate the big data with large volume of high velocity, complex and variable data. Big data becomes a challenge when they are difficult to process and extract knowledge ...
  • Myo, Zin Mar; Mon, Myat Thida (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Long Term Evolution(LTE)can support multimedia services.To guarantee the different requirements of the different services, packet scheduler plays an important role in LTE. Especially, the additional challenges are ...
  • Mar, Yi Yi; Maw, Aung Htein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Distributed Hash Table (DHT) is a promising approach for building a large data management platform. But it cannot support complex query processing due to its one-dimensional index structure. Complex query processing ...
  • Aung, Thazin; Tun, Ei Ei Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Steganographic techniques allow one party to communicate information to another without a third party knowing that the communication is occuring. Steganography works by replacing bits of useless or unused data in regular ...
  • Phyo, Zin Mar; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Mobile Ad hoc Network (MANET) is a collection of mobile devices and is selfconfiguring, dynamically changing, multi-hop wireless network which forms a communication network via multi hop wireless network connection, ...

Search Repository

Browse

My Account