Browsing by Title

Sort by: Order: Results:

  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Linn, Thu Zar; Aung, Than Htike (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Association rule mining is widely used in business enterprise to analyze for marketing strategies and its good is to find interesting association or correlation relationship among a large set of data items. With massive ...
  • Wai, Chit Hnin; Soe, Khin Thanda (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Recommender Systems typically use techniques from collaborative filtering which recommend items that users with similar preferences have liked in the past and, also predict new rating by averaging ratings between pairs ...
  • Sandy, Thoon; Theint, Khant Kyawt Kyawt (University of Computer Studies, Yangon, 2019-03)
    Compression creates a brand new document that shops records in a format that require much less area. Compression strategies are used in video conferencing, video telephony, video on mobile telephone, video on internet. ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...
  • Yee, Hnin Lai; Myint, Mu Mu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The healthcare system collects large amounts of healthcare data which unfortunately, are not mined to discover hidden information for effective decision making. Discovery of hidden patterns and relationships often goes ...
  • Aung, Hay Mar Su; Pa, Win Pa (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This paper presents a study of comparison on three different machine learning techniques to sentiment analysis for Myanmar language. The fundamental part of sentiment analysis (SA) is to extract and identify the ...
  • Soe, Ei Phyu Phyu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Speech synthesis system is a popular field in natural language processing of computer science for various languages. The process of speech synthesis is to produce the human-like speech from corresponding language and ...
  • Aung, Yu Nandar; Zaw, Ei Phyu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Data Mining is a fast developing field of computer science and technology, which are helpful to enable end users for decision making process. One of the most important data mining processes is that of Association Rule ...
  • Tun, Kyaw Naing; Aye, Zin May; Khaing, Kyaw Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The number of applications for smart mobile devices is steadily growing with the continuous increase in the utilization of these devices. the Installation of malicious applications on smart devices often arises the ...
  • Ei, Yee Mon (2022-09)
    Nowadays, big data is widely used in healthcare for prediction of diseases. Breast cancer is the most occurred cancer disease in the world that occurs in a woman. If this disease is detected in early stages, there will ...
  • Htun, Myo Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Audio fingerprinting is a smart technology to identify music contents relevant to the query by comparing the content-based hash (fingerprint) of the query to known hashes in the fingerprint database. For a million-song ...
  • Aung, Su Wit Yi; Khaing, Soe Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Land use and land cover change has become a vital component in current strategies for managing natural resources and monitoring environmental changes. Analyzing the changing of hydrological area, vegetation area and ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing paradigm contains many shared resources such as infrastructures, data storage, various platforms and software. In cloud storage service, consistency not only influences the performance and availability ...
  • Myo, Zin Mar; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Long Term Evolution (LTE) is a mobile network that operates completely in packet domain. Due to the variation of radio condition in LTE, the obtainable bit rate for active users will vary. The two factors for radio ...
  • Phyo, Thazin; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper is presented the mining association rules among items in a large database of sales transactions. The mining of association rules can be mapped into the problem of discovering large itemsets which appear in ...
  • Ko, Su Linn; Aye, Hnin Hnin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A large number of expert systems require the use of forward chaining or data driven inference. Rulebased systems are really only feasible for problems for which any and all knowledge in the problem area can be written ...
  • Nwe, Thiri; Hlaing, Swe Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Analyzing the program conditional control flow the important technique using in program execution. Software errors are often caused mostly due to the complexity of software, programming errors, time pressure and changing ...
  • Tun, Hlaing Nwe; Win, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining is the process of digging trough large files and databases to discover useful, non-obvious and often unexpected trends and relationships. Association rules are popular representations in data mining. It finds ...
  • Khaing, Kyaw Thet; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, ...

Search Repository

Browse

My Account