UCSY's Research Repository

Browsing Master Thesis by Issue Date

Browsing Master Thesis by Issue Date

Sort by: Order: Results:

  • Hlaing, Soe Thiri (University of Computer Studies, Yangon, 2022-06)
    Gender classification is a basic function of determining gender by facial features which determine gender based on face images. Visual information from faces provides one of the more important sources of information ...
  • Htoo, Khine (University of Computer Studies, Yangon, 2022-06)
    Document Images are important in everyday lives. Document Image Recognition is required for information retrieving, searching, editing, and reporting of image text. There are several kinds of document images such as ...
  • Wai, Koung Hsu (University of Computer Studies, Yangon, 2022-06)
    Data security plays an important role in every organization. Therefore, many organizations need to protect their information or data when data in transmission. This system intends to implement the combination of the ...
  • Paing, Shwe Yi (University of Computer Studies, Yangon, 2022-06)
    The current ultrasonic impediment evasion robot just purposes an ultrasonic sensor during the time spent obstruction aversion, which must be tried not to accord to the decent snag evasion course. Hindrance evasion ...
  • San, Htun Ei Ei (University of Computer Studies, Yangon, 2022-06)
    With the growing popularity of the XML model and the proliferation of online XML documents, the automated matching of XML documents and databases has become a critical problem. Currently, many recent applications are ...
  • Hlaing, Su Su (University of Computer Studies, Yangon, 2022-06)
    Steganography is a technique whereby we put the existence of a message to question by simply covering it up within another file image or video. This system used the input audio signals as hidden message with audio ...
  • Win, Thida (University of Computer Studies, Yangon, 2022-06)
    Peer-to-Peer (P2P) file sharing is a technique of network file sharing. Clients can direct access and share the files to other clients in P2P network. The P2P file sharing system does not require any central server. ...
  • Kyaw, Chue Theingi (University of Computer Studies, Yangon, 2022-06)
    The growth of information technology has led to the increasing need of computing and storage. Cloud services are the technologies with high demand, consisting of a set of virtualized resources that serve the users as ...
  • Aung, May Thagyan (University of Computer Studies, Yangon, 2022-06)
    Weather forecasting is avital role in meteorology and has been one of the most particularly problems all over the world. Data mining techniques are useful for objective recognition, forecasting, and various kinds of ...
  • Kyawt, Khin Kyawt (University of Computer Studies, Yangon, 2022-06)
    During the past decades, online market places have been popular and most of the sellers also request the customers to express the reviews of the products. Nowadays individual and groups depend heavily on website for ...
  • Win, Su Sandar (University of Computer Studies, Yangon, 2022-06)
    Face recognition is a computer application which is used to indentify or verify a person in a digital image, based on digital image processing and is an active area of research. The face recognition system proves to ...
  • Aye, Nwe Nwe (University of Computer Studies, Yangon, 2022-06)
    Since web is expanding day by day and people generally rely on web for communications, e-mails are the fastest way to send information from one place to another. Nowadays all the transactions and all the communications ...
  • Zin, Poe Myat (University of Computer Studies, Yangon, 2022-06)
    The World Wide Web is a popular and interactive tool for spreading information today that is expanding rapidly. Web mining is the process of extracting patterns and implicit data from artifacts or activities associated ...
  • Htike, Su Yadanar Than (University of Computer Studies, Yangon, 2022-06)
    With the adventure of the Internet, it became possible to build large-scale distributed applications due to the existence of a global, packet-based communication infrastructure. This increases in application scale by ...
  • Ei, Yee Mon (2022-09)
    Nowadays, big data is widely used in healthcare for prediction of diseases. Breast cancer is the most occurred cancer disease in the world that occurs in a woman. If this disease is detected in early stages, there will ...
  • Htay, Khin Mar (University of Computer Studies, Yangon, 2022-09)
    Every day, there are issues on many job-calling websites on the internet. Some of the jobs advertised online are actually fake jobs that lead to the theft of sensitive information. So it needs to be identified. Using ...
  • Htway, Min Khant (2022-09)
    Nowadays, clustering is the important technique for the analysis of data. There are many clustering algorithms. Among them, Density-Based Spatial Clustering of Application with Noise (DBSCAN) is useful for medical ...
  • Nge, Myat Phoo (University of Computer Studies, Yangon, 2022-09)
    Large amount of data is generated in electronic form. The data recovery services are required to maintain this data very efficiently. Since organizations (include universities) have become very dependent on digital ...
  • Sann, Aye Thawta (University of Computer Studies, Yangon, 2022-09)
    An Intrusion Detection System (IDS) acts as a cyber security system which monitors and detects any security threats for software and hardware running on the network. Although there have many existing IDS but still face ...
  • Phyo, Hnin Nwe (2022-09)
    The prevention of disease transmission in plants is largely dependent on early detection of pathogen infection. Plant diseases can be identified using machine learning techniques before they fully manifest their symptoms. ...

Search Repository



Browse

My Account