UCSY's Research Repository

Browsing Master Thesis by Title

Browsing Master Thesis by Title

Sort by: Order: Results:

  • ZAW, HNIN NANDAR (University of Computer Studies, Yangon, 2022-12)
    No matter where they are in the world, people or individuals may now easily and cheaply communicate with one another because of the Internet. In addition to maintaining social networks and relationships, people can ...
  • Aung, May Thu (University of Computer Studies, Yangon, 2022-12)
    Detecting various classes of objects and measuring the distance between camera and objects are implemented in this system. The input of the system is an image or video which are captured by the camera. YOLOv5 architecture ...
  • Paing, Shwe Yi (University of Computer Studies, Yangon, 2022-06)
    The current ultrasonic impediment evasion robot just purposes an ultrasonic sensor during the time spent obstruction aversion, which must be tried not to accord to the decent snag evasion course. Hindrance evasion ...
  • Aung, Thet Thet (University of Computer Studies, Yangon, 2021-05)
    Using semantic web technology through Information Retrieval (IR) process is becoming an efficient way to enhance the accuracy of the search process and retrieve more relevant results in the web-based systems, especially ...
  • LWIN, NANDAR MOH MOH (University of Computer Studies, Yangon, 2023-07)
    Due to the dramatic improvement of ecommerce, web sources which are important for both potential customers and service providers rapidly emerge in prediction and decision purposes. Opinion mining techniques become popular ...
  • Oo, Htun Zaw (University of Computer Studies, Yangon, 2018-08)
    Many organizations use World Wide Web for multipurpose platform during these days. It is very important to understand how a web site is being used by users. Web usage mining also known as web log mining, aims to discover ...
  • Win, Thida (University of Computer Studies, Yangon, 2022-06)
    Peer-to-Peer (P2P) file sharing is a technique of network file sharing. Clients can direct access and share the files to other clients in P2P network. The P2P file sharing system does not require any central server. ...
  • Win, Htet Htet (University of Computer Studies, Yangon, 2019-01)
    Information applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...
  • Win, Hlaing Hlaing (University of Computer Studies, Yangon, 2021-11-23)
    Data mining techniques are extensively used for data analysis in a variety of applications. Especially, credit analyzers often use predictive analysis of credit risk to determine the applicant users are to be trusted ...
  • Aung, Win Pa Pa May Phyo (University of Computer Studies, Yangon, 2023-01)
    Employee attrition is the departure of employees from the organization for any reason (voluntary or involuntary), including resignation, termination, death, or retirement. Attrition is widely understood to be one of ...
  • Zu, Chan Myae Myint (University of Computer Studies, Yangon, 2022-06)
    Nowadays, the education system has been changed from teacher centered approach to learner-centered approach. Thus, students’ related features need to analyze to predict students’ academic performance to provide the ...
  • Win, Phyu Phyu (2022-09)
    Online banking system has created an enormous impact on IT, Individuals, and networking worlds. Online banking systems and its exclusive architecture have numerous features and advantages over traditional banking system. ...
  • Yee, Chue Wut (Unversity of Computer Studies, Yangon, 2020-01)
    Nowadays, with the development of the internet, it is available to collect very large amounts of data and searching effective information from these data develop into an essential work. The major purpose of an Information ...
  • Oo, Sabai (University of Computer Studies, Yangon, 2022-06)
    CORONAVIRUS DISEASE (COVID-19) is the infectious disease caused by the coronavirus that was first discovered in Wuhan City, China, and then spread throughout the world. Many researchers have proposed various methods ...
  • Aung, Thidar (University of Computer Studies, Yangon, 2019-08)
    Text document segmentation is one of the essential steps in text document recognition and extraction systems. The existing image segmentation methods are not much reliable for text with colour gradient and texture ...
  • Nwe, Yie Yie (University of Computer Studies, Yangon, 2022-09)
    Database security is the system, processes, and procedures that protect a database from unintended activity. The protection of data storage is a challenging and formidable task and so the user data should be protected ...
  • Hlaing, Hnin Hsu (University of Computer Studies, Yangon, 2022-06)
    Nowadays, telecommunication technologies are developing rapidly and many organizations are mostly using these technologies. The well known telecommunication technology is the short message service (SMS). It plays a ...
  • Wai, Koung Hsu (University of Computer Studies, Yangon, 2022-06)
    Data security plays an important role in every organization. Therefore, many organizations need to protect their information or data when data in transmission. This system intends to implement the combination of the ...
  • Thu, Chan Myae (University of Computer Studies, Yangon, 2022-09)
    Today people are widely used internet, electronic records because of their ease of alteration and fast transition. The society is becoming more and more digitalized – therefore Information security is becoming more ...
  • Phu, Khing Shwe Ye (University of Computer Studies, Yangon, 2022-09)
    Address Resolution Protocol (ARP) is a very popular communication protocol in the local area network (LAN), working under the network layer, as per the open systems interconnection (OSI) model. ARP is used by computers ...

Search Repository



Browse

My Account