UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Phyu, Ei Ei; Moe, Khin Myat Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The demand of security is getting higher in these days due to easy reproduction of digitally created data. Digitally hide the secret information in some media content like digitized identification card, student’s registration ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Latt, Win Zaw; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Education is an important part of human life and it is also valuable asset for career achievement. Nowadays, people gained certificates from the institution they had learnt and, those graduation documents are presented as ...
  • Mon, Ei Ei; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. The cloud allows users to avoid upfront ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Tun, Khin Myaing Myaing; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is recognized as an absolute need in application development. The healthcare sector deals with very sensitive data, patient’s medical records need to be kept confidential; hence, security is very important. ...
  • Soe, Naing Thura; Thant, Khin Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Dijkstra’s Algorithm solves the problem of finding the shortest path from a point (the source) to a destination. This problem is sometimes called the single-source shortest path problem. In these days, the world become ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    XML (eXtensible Markup Language) and its schema language are becoming a primary data exchange format on the current web. In the next generation of the Semantic Web, the drawbacks of XML and its schema are appeared. ...
  • Tun, Thu Thu; Htoo, Nay Zar Chi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The Web is moving toward a collection of interoperating Web Services. Achieving this interoperability requires dynamic discovery of Web Services. This paper will develop a service repository that extends the UDDI registries ...
  • Nwe, San San; Kham, Nang Saing Moon (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social media has quickly become popular as an important means that people, organizations use to spread information of divert events for various purposes, ranging from business intelligence to nation security. However, the ...
  • Tun, Nyan Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Information and access to information is important in modern society. Network security is necessary to counter the threats and make network safe to use. There are some methods to prevent eavesdropping or falsification ...
  • Nwet, Khin Thandar; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper describes an alignment system that aligns Myanmar-English texts at the sentence and word level in parallel text. Sentence and word level alignment is the identification of the corresponding sentence and word ...
  • Takada, Kazuma; Nakajima, Hideharu; Sagisaka, Yoshinori (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Aiming at communicative speech synthesis, we analyzed sentence-final prosody characteristics through subjective impression on constituting lexicons. Since Japanese sentence-final particles and postpositionals are ...
  • Zaw, Wai Phyoe; Hlaing, Zar Chi Su Su (ICCA, 2021-02-25)
    Nowadays, a lot of information is valuable for people who want to predict and decide the market or economic or political or many different areas. Because of the information age, customers are also no longer interested in ...
  • Chan, Wint Nyein; Thein, Thandar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-17)
    Nowadays, Twitter Sentiment analysis has become popular as it helps the organization to determine marketing strategy by providing public opinions. Efficient techniques to collect a large amount of Twitter stream data ...
  • Nain, Win Theingi; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Mining opinions and sentiments from natural language is challenging, because it requires a deep understanding of the explicit and implicit, regular and irregular, and syntactical and semantic language rules. Sentiment ...
  • Zin, Thet Thet (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Previous year, many researchers have been sentiment analysis on many focus languages. They analyzed and categorizing opinions expressed in a text. People express their opinions and feeling on social media as a daily ...
  • Khing, Wai Phyoe; Aye, Mya Mya; Tun, Hla Myo (ICCA, 2021-02-25)
    The audio signal represents sounds that may contain speech, song and all types of sounds. The audio signal processing provides many research areas such as speech recognition, audio events recognition, music information ...
  • Sein, Ma Htaw; Win, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Sequential pattern mining is an important data mining problem with broad applications. Most of the sequential pattern mining methods, such as GSP (Generalized Sequential Pattern) and AprioriAll explore a candidate ...
  • Hlaing, Khin Su; Tun, Ei Ei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The rising popularity of electronic commerce makes data mining an indispensable technology for several applications, especially online business competitiveness. The World Wide Web provides abundant raw data in the form of ...

Search Repository



Browse

My Account