UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Yee, Tin Tin; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure. Cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of ...
  • Aung, Htain Lynn; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    E-learning is the fast and essential method of delivering educational contents. E-learning can support one of the alternative ways of quality teaching and learning as well as lifelong learning. The paper argues for the ...
  • Hlaing, Swe Swe (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, the advancement in computing technology and the realibility of computers has led to signification changes in the way that data are collected and analyzed. This system is to predict the risk level of patients in ...
  • Win, Aye Thida; Win, Thin Zar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image recognition is one of the fields of Artificial Intelligence. Nowadays, Image recognition is affecting not only corporations using it within an economic interest but also the average user who uses a digital camera. ...
  • Oo, Sheinn Thawtar; Thida, Aye (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    At the present time, machine translation is progressively more and more used to support multilingual communications. In the process of machine translation, uses of figurative language are one of the reasons that can cause ...
  • Aung, Myintzu Phyo (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In machine translation system of Myanmar to English, grammar rules are used to translate the whole input Myanmar sentences to target English sentences. These rules are based on the pattern of simple sentences in ...
  • Soe, The` The` (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A variety of Verb Phrase exists in Myanmar Language including Simple Verb Phrase, Compound Verb Phrase and so on. This paper explains the feature of Myanmar Verb Phrase and English Verb Phrase. And then, the system ...
  • Han, Khin Myo; Thein, Tin Tin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The understanding of abbreviations, widely used in writing is an important role for natural language processing (NLP) applications. Many abbreviations are followed a predictable pattern in which the first letter of each ...
  • Thin, Khin Saw Yu; Han, Thwe Mu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper proposes a system for recognizing the identity card number. The quality of the color image of identity card is enhanced by image filtering technique. Color sensing is carried out to get the image portion of ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Protection of IEEE 802.11 networks means protection against attacks on confidentiality, integrity and availability. Possible threats come from vulnerabilities of security protocols. The rapid growth in the use of ...
  • Win, Ei Shwe Sin; Mon, Myat Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper to protect copyright, ownership and content integrity of digital media including digital watermarking techniques. The primary motivation of this article is to study the principles of cryptographic primitives ...
  • Lwin, Thin Yu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The modern era is of digitalization and thus we want to transmit large data in limited bandwidth. Today a variety of computer, scientific and engineering application have difficulty to store and transmit the large size ...
  • Reen, Mau; Khaing, Khathy (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image compression is very important in many applications, especially for progressive transmission, image browsing, multimedia applications. Image contains large amounts of information that requires much storage space, ...
  • Thant, Wut Yee; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, we propose a support vector machines (SVMs) method of classifying image regions hierarchically based on their semantics rather than on low-level features. First, image regions are segmented using the ...
  • Thu, May Phyo; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has ...
  • Khaing, May Thet; Aye, Zin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Aung, Yi Yi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...

Search Repository



Browse

My Account