UCSY's Research Repository

Browsing Faculty of Information Science Collection by Title

Browsing Faculty of Information Science Collection by Title

Sort by: Order: Results:

  • Thein, Thin Lai Lai; Nyaung, Dim En (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, online customer reviews become a significant informative resource due to the rapid development of web. In a webpage, the reviews are written in natural language and are unstructuredfree- texts scheme. To ...
  • Htun, Naing Linn; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The popularity of social media applications has rapidly increased over the past few years. Most people use social media applications for sharing data, chatting with friends, group conversations, uploading photos and media. ...
  • Aung, Than Htike; Kham, Nang Saing Moon (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Since origination of mining, frequent pattern mining has become a mandatory issue in data mining. Transaction process for mining pattern needs efficient data structures and algorithms. This system proposed tree structure, ...
  • Soe, Nyein Chan; Thein, Thin Lai Lai (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In recent decades, road transportation systems have become increasingly complex and congested. Traffic congestion is a serious problem that affects people both economically as well as mentally. Road traffic jam is a major ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Moe, Myint Myint; Oo, Khine Khine (Proceedings of the Tenth International Conference on Science and Engineering (ICSE 2019), 2019-12-07)
    Test-driven development (TDD) is a foundation for software evolution but unit tests must be performed before production code. To enhance both external code quality and programmers’ productivity can be insisted on the ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Phwe, Phyu Sin; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data Warehouse and OLAP processing is one of the powerful tools for knowledge discovery in large complex data. Data warehouse provides online analytical processing (OLAP) tools for interactive analysis of multidimensional ...
  • Khine, Wai Wai; Thein, Thinn Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Collaborative recommender systems allow personalization for e-commerce by exploiting similarities and dissimilarities among users' preferences. This paper presents an approach to using data mining for e-commerce. It applies ...
  • Mhon, Gant Gaw Wutt; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Web usage mining is the discovery of user access patterns from Web usage logs. The paper presents two XML (Extensible Markup Language) 1.0 applications and a web data mining application which utilizes it to extract web ...
  • Kham, Nang Saing Moon; Maw, Sis Hmue (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    All around the world, people experience delays due to bad traffic conditions and finding the best possible roads in road network from given source to given target location is an everyday problem. Graph database technology ...
  • Mon, Su Su; Oo, Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A distributed database is a database with its data elements stored at several sites of a computer network. Certain data items may be redundantly stored at more than one site for reliability reasons. A replicated database ...
  • Nyaung, Dim En; Thein, Thin Lai Lai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated ...
  • Zan, Hnin Wai; Thein, Thin Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents information of most famous Bagan pagodas and the similar information of pagodas among the famous Bagan pagodas by using Apriori Algorithm. Nowadays, people are quite busy as they are occupied with their ...
  • Tin, Lwin Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Information hiding technique is becoming a research hotspot in information security, and will be widely used to national security, e-commerce, egovernment, copyright protection and covert communication. This paper ...
  • Khaing (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Non-Governmental organizations (NGOs) have a significant role in the development of the society because they play a vital role in the interest of general public. There are many problems faced by those NGOs regarding ...
  • Soe, Nyein Chan; Thein, Thin Lai Lai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Road traffic congestion or jam is main problem in urban area of both developing and developed countries. In order to solve this problem, traffic congestion states of road networks are estimated so that congested road ...
  • Maw, Myint Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior… It is a disciplined way to clean up code that minimizes the chances ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Today, Hyper-Heuristic is not new in AI Field. It is an emerged search technology to select or generate (new) low level heuristics for combinatorial optimization problem and has been applied in many problem domains: personal ...

Search Repository



Browse

My Account