UCSY's Research Repository

Ph.D/Master Thesis & Dissertation

Ph.D/Master Thesis & Dissertation

 

Collections in this community

Recent Submissions

  • Hlaing, Su Su (University of Computer Studies, Yangon, 2022-06)
    Steganography is a technique whereby we put the existence of a message to question by simply covering it up within another file image or video. This system used the input audio signals as hidden message with audio ...
  • Hlaing, Soe Thiri (University of Computer Studies, Yangon, 2022-06)
    Gender classification is a basic function of determining gender by facial features which determine gender based on face images. Visual information from faces provides one of the more important sources of information ...
  • Paing, Shwe Yi (University of Computer Studies, Yangon, 2022-06)
    The current ultrasonic impediment evasion robot just purposes an ultrasonic sensor during the time spent obstruction aversion, which must be tried not to accord to the decent snag evasion course. Hindrance evasion ...
  • Wai, Koung Hsu (University of Computer Studies, Yangon, 2022-06)
    Data security plays an important role in every organization. Therefore, many organizations need to protect their information or data when data in transmission. This system intends to implement the combination of the ...
  • Htoo, Khine (University of Computer Studies, Yangon, 2022-06)
    Document Images are important in everyday lives. Document Image Recognition is required for information retrieving, searching, editing, and reporting of image text. There are several kinds of document images such as ...
  • Kyi, Nan Chaw Su (University of Computer Studies, Yangon, 2022-06)
    An effective car parking of a condo is conducted in this system with the aim of reducing the time for finding the free parking lots. The condo has an two-way road for each entrance and exit. Smart car parking enables ...
  • Htun, May Tharaphy (University of Computer Studies, Yangon, 2022-06)
    Since the technology is being improved, digital media are facing challenges like copyright infringements. Digital data can be easily created, copied, processed, and distributed freely among unauthorized users. The ...
  • Lwin, Soe Soe (University of Computer Studies, Yangon, 2022-05)
    Internet is made up of web pages, news stories, status updates, blogs, and many other things. The amount of information available on the internet is ever-growing. Automatic text summarization is greatly needed to get ...
  • Thant, Phyu Phyu (University of Computer Studies, Yangon, 2022-04)
    This system implements data recovery in cloud computing by using Enriched Genetic Algorithm (EGA). Cloud computing provides various kinds of services to its users. Storage-as-a-service is one of the services provided ...
  • Khaing, Ei Ei (University of Computer Studies, Yangon, 2022-04-22)
    Automated Guided Vehicles have many potential applications in manufacturing, medicine, space and defense. Barrier Avoidance Robot is primary used in embedded systems. The robot is using the fuzzy logic and applied in ...
  • Oo, Mi Khine (University of Computer Studies, Yangon, 2022-04-21)
    The emergence of internet technology provides access to an endless supply of data, information and knowledge to many different areas. Since the amount of digital information has been increased rapidly day by day, ...
  • Htwe, Thin Thin (University of Computer Studies, Yangon, 2022-04-21)
    In clothing shops, finding user’s desired dress manually is time consuming and needs a large amount of human labor. Although k-Nearest Neighbor (kNN) search algorithm is one of the most popular methods among many ...
  • Maung, Tin Maung (University of Computer Studies, Yangon, 2022-04-01)
    Communication technology and devices are timely changing and increasing various levels and different operating systems in all over the world. In this day and age, our country is just developing country and most of the ...
  • Than, Moh Moh (University of Computer Studies, Yangon, 2021-02-01)
    Cloud computing allows services available to customers on a pay-as-you-go model through geographically distributed data centers (GDCs) located around the world. Almost all Internet services are built on GDCs in order ...
  • ZAW MYINT, AUNG (University of Computer Studies, Yangon, 2022-02-01)
    With the rapid development of mobile technology, location-based services (LBS) have become essential useful services to provide geographic information to mobile users. Location-based services (LBS) support the relevant ...
  • Linn Htun, Naing (University of Computer Studies, Yangon, 2021-12)
    Mobile phone technology is changing rapidly, and there are a growing number of different device models with different operating systems around the world. In particular, Android mobile devices are becoming much more attractive ...
  • Win, Hlaing Hlaing (University of Computer Studies, Yangon, 2021-11-23)
    Data mining techniques are extensively used for data analysis in a variety of applications. Especially, credit analyzers often use predictive analysis of credit risk to determine the applicant users are to be trusted ...
  • Oo, Myat Cho Mon (University of Computer Studies, Yangon, 2021-02)
    In the current big explosion era, data is increasing dramatically every year. Gaining critical business insights by querying and analyzing this vast amount of data is becoming a challenge for conventional data mining ...
  • Aung, Than Htike (University of Computer Studies, Yangon, 2021-11)
    Lots of structured and unstructured information can provide educational insights through information retrieval. Gathering educational information in an effective way is also a major challenge. In addition, historical ...
  • Thaw, Tin Zar; Khin, Mie Mie (American Journal of Software Engineering and Applications, 2013-08)
    The Extensible Markup Language (XML) is becoming a de-facto standard for exchanging information among the web applications. Efficient implementation of web application needs to be efficient implementation of XML and XML ...

View more