Faculty of Computing Collection: Recent submissions

  • Hlaing, Khin Nilar; Khine, May Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The timely procurement and delivery of materials / equipment to yard, site and assembly locations requires a huge team effort and is paramount for the successful work done for shipyards and construction sites.The ERRP ...
  • Myint, Aye Nandar; Khine, May Aye; Khaing, Myo Kay (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, forecasting of exchange rates plays an important role in international economics. Additional to basic economic and financial news, investors and traders employ in their decision process technical tools to ...
  • Aye, Tin Nilar; Khine, May Aye (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The process of detecting and removing database defects and duplicates is referred to as data cleaning. The fundamental issue of duplicate detection is that inexact duplicates in a database may refer to the same real ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Hlaing, Thuzar; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    To avoid high computational costs in identifying intrusions by IDSs, the size of a dataset needs to be reduced. Feature selection is considered a problem of global combinatorial optimization in machine learning, which ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In today digital age, there are more demands to improve techniques for information security. One of the solutions is steganography, hiding sensitive information within innocentlooking cover media. In this paper, we ...
  • Wai, Ei Phyo; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Face recognition has become one of the most important fields in automated biometric identification system [1].The face is our primary focus of attention in social intercourse, playing a major role in biometric security ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Traveling salesman problem (TSP) is one of the most famous combinatorial optimization (CO) problems, which has wide application background. Ant Colony Optimization (ACO) is a heuristic algorithm which has been proven ...

Search Repository



Browse

My Account