UCSY's Research Repository

Browsing Faculty of Computer Science Collection by Title

Browsing Faculty of Computer Science Collection by Title

Sort by: Order: Results:

  • Mon, Aye Myat; Soe, Khin Mar (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Word embedding represents the words in terms of vectors. It is influenced on different NLP research areas such as document classification, author identification, sentiment analysis, etc. One of the most popular embedding ...
  • Tar, Hmway Hmway; Nyunt, Thi Thi Soe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Documents clustering become an essential technology with the popularity of the Internet. That also means that fast and high-quality document clustering technique play core topics. Text clustering or shortly clustering ...
  • Tar, Hmway Hmway; Nyunt, Thi Thi Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Web document clustering becomes an essential technology with the popularity of the Internet. That also means that fast and high-quality document clustering techniques play core topics. One of the main issues for ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Community structure in scientific collaboration network has become an important research area. Coauthor of a paper can be thought of as a collaborative document between more than one authors. Community detection in ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe; Cho, Pyae Pyae Win (IEEE 4th International Conference on Computer and Communication Systems(2019), 2019)
    Many types of social network are modelled as graphs. Community detection has been an important research area in social graph analysis. Community detection can be viewed as an optimization problem. Nowadays, researchers ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Second International Conference on Advanced Information Technologies (ICAIT 2018), 2018-11-01)
    Community detection (CD) plays an important role in analyzing social network features and helping to find out valuable hidden information. Many research algorithms have been proposed to find the best community in ...
  • Aye, Thi Dar; Soe, Khin Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Association rule mining is a technique to find useful patterns and associations in transactional databases. The mining of association rules can be mapped into the problem of discovering large (frequent) itemsets where ...
  • Thu, Su Myat; Pa, Win Pa (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Classification of data objcts based on a predefined knowledge of the objects is a data mining and knowledge management techniques used grouping similar data objects together. It can be defined as supervised learning ...
  • Maung, Thida Wai; Phyu, Win Lei Lei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining is the process of analyzing large data sets in order to find patterns that can be help to isolate key variables to build predictive models for management decision making. The discovery of interesting ...
  • Aye, Kyar Nyo; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data continue a massive expansion in scale, diversity, and complexity. Data underpin activities in all sectors of society. Achieving the full transformative potential from the use of data in this increasingly digital world ...
  • Aye, Hnin Nwe; Pa, Win Pa (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Classification can be used as in the form of data analysis that can be used to extract models describing the important data classes. This aim of this paper is to exmaine the performance of decision tree algorithms. ...
  • Aung, Nyein Thwet Thwet; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents Word Sense Disambiguation for Myanmar Language. Word Sense Disambiguation (WSD) is an intermediate but an important step in Natural Language processing. WSD is defined as the task of finding the ...
  • Naing, Hnin Hnin; Nyunt, Thi Thi Soe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Artificial neural networks (ANNs) are computing models for information processing and pattern identification. An ANN is a network of many simple computing units called neurons or cells, which are highly interconnected ...
  • Nyunt, Thi Thi Soe; Phyu, Hnin Pwint (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Designing, understanding and maintaining the source code is a crucial task in reengineering for software maintenance. Formal Concept Analysis (FCA) is a mathematical technique which has been applied in several fields and ...
  • Shein, Su Mon; Nwe, Khine Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, distributed system become very popular in the operational environment of computer field. Heart of every distributed system is distributed file system in which informations are separated throughout the network as ...
  • Aye, Kyar Nyo; Thein, Ni Lar (Ninth International Conference on Computer Applications (ICCA 2011), 2011-03-02)
    The Internet is a huge collection of data that is highly unstructured which makes it extremely difficult to search and retrieve valuable information. Due to the massive number of unstructured data, multimedia search ...
  • Soe, Thinn Lai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This system proposes an indexing structure that is built on the basic context document by using semantic suffix tree clustering and context ontology. Context is any information that can be used to characterize the situation ...
  • Soe, Aye Aye; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes ...
  • Lwin, Myint Myint; Nyunt, Thi Thi Soe; Yuzana (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data Exchanging is one of the most important sections in Web Application. XML is flexible and platform independent which provide for data exchanging. Most of the features such as information exchanging and information ...
  • Mo, Hsu Myat; Nwet, Khin Thandar; Soe, Khin Mar (The Tenth International Conference on Genetic and Evolutionary Computing (ICGEC 2016), 2016-10-21)
    Named Entity recognition (NER) is a subtask of information extraction and information retrieval that automatically identify proper nouns in texts and classify into predefined categories of name types. This paper introduces ...

Search Repository



Browse

My Account