UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Hlaing, Thuzar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    A large and growing number of web pages display contextual knowledge based on keywords automatically extracted from the text of the page and this is a substantial source of revenue supporting the web today. In addition, ...
  • Wai, Yadanar; Aye, Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Classification is a process of finding the common properties among various features and classifying them into classes.The feature selection process is very important which selects a subset of relevant features, so that ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    With the enormous growth of computer networks, network security is gaining increasing importance. Therefore, the role of Intrusion Detection Systems (IDSs) is becoming more important. There are many techniques ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only ends users applications ...
  • Nyaung, Dim En (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    One of the important types of information on the Web is the opinions expressed in the user generated content, e.g., customer reviews of products, forum posts, and blogs. Customer reviews of products are focused in this ...
  • Thein, Thin Lai Lai; Nyaung, Dim En (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, online customer reviews become a significant informative resource due to the rapid development of web. In a webpage, the reviews are written in natural language and are unstructuredfree- texts scheme. To ...
  • Thein, Shwe Sin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The association rule mining is one of the primary sub-areas in the field of data mining . This type of mining ,the association rule searches for interesting relation among item in a given data set , has been used in numerous ...
  • Khaing, Ngwe Zin; Sandar, Khin; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining in an area in the intersection of machine learning statistics, and database is to use searching for relationships and global pattern that exits, but is hidden in large database. The discovery of interesting ...
  • Htun, Sai Zaw Moe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper studies the Minimum Spanning Tree Methods. A graph is a collection of nodes and edges, but has no rules dictating the connection among the nodes. All trees are graphs. A tree is a special case of graph in ...
  • Soe, Nwe Nwe; Htay, Win (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper offers finding the region of interest and automatic cropping from palm leaf manuscripts developed by using one-dimensional segmentation. This system can be used to provide for enhancing palm leaf manuscripts ...
  • Oo, Aye Thandar; Khin, Mie Mie (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is intended to present optimal route finding system for road network application. It is used to operate in complicated mapping situations and new unknown environments. This technique can be implemented to find ...
  • Win, Zin Me Me; Maw, Tin Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the significant increment of today’s network, there is a decrease in the efficiency of the network. The performance and reliability of the Internet depend, in large part, on the operation of the routing protocols. ...
  • Thu, Hnin Pwint; Aung, Khin Sanda (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, the transportation becomes a vital role in developing countries so people need to know the shortest ways. Therefore, this system will be developed intending to reduce the transportation time by applying one ...
  • Htun, Nyi Nyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents a method based on receptor model for finding the shortest smooth path in variable size with safety margin, where clothoid curvature is used for smoothing path. The method modifies the results of grid-based ...
  • Htwe, Khin Sabai; Aye, Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a Region of Interest (ROI) extraction method is proposed based on labeling vein images using morphological processing. Firstly, finger vein images are segmented to remove the unwanted background or the ...
  • Min, Mar Mar; Thein, Yadana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, we have presented a Fingerprint Recognition System which combines both the features extraction by applying a statistical and geometry approach. First, the core point (CP) of the input fingerprint is detected. ...
  • Win, Zin Mar; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Fingerprint recognition is one of the most well-known and publicized biometrics for personal identification. Fingerprints exhibit oriented texture-like patterns. The texture information of the fingerprint can be used ...
  • Win, Zin Mar; Sein, Myint Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Fingerprints are widely used in biometric techniques for automatic personal identification work. In this paper, a fingerprint recognition system is developed to identify a person according to fingerprint image on Myanmar ...
  • Phyo, Aye Su; Sandar, Khin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper proposes a fingerprint types classification algorithm using Learning Vector Quantization (LVQ) with FingerCode features. This algorithm assigns each fingerprint image to one of the five subclasses, according ...
  • Latt, Tin Myo; Thida, Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Morphological analysis (MA) is needed in any Natural Language Processing (NLP) Application. It means taking a word as input and identifying the stem and affix. MA provides information about a word’s semantics and the ...

Search Repository



Browse

My Account