UCSY's Research Repository

Browsing Faculty of Information Science Collection by Title

Browsing Faculty of Information Science Collection by Title

Sort by: Order: Results:

  • Aung, Myat Soe; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case based reasoning (CBR) is very important subfield of artificial intelligence which is growing rapidly. CBR based applications are used very commonly in many different fields. In this paper, we present classification ...
  • Than, Wai Me Me; Kham, Nang Saing Moon (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper presents the probabilistic model named Twodimensional Probabilistic Model (2DPM). In this model, terms are seen as disjoin events, and terms and categories are realeated to each other. Since the documents are ...
  • Win, Nay Aung Soe; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Big data in terms is the huge volume of data that is difficult to be processed, handled and managed. The term big data is an emerging trend where a number of researches and data scientists are carried out for data ...
  • Soe, Hay Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Association Rules is the process of identifying relationships among set of items in transaction database. Finding frequent itemsets is the most expensive step in Association rule discovery. Real world datasets are ...
  • Mon, Cho Thel; Thein, Thin Lai Lai (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In data mining, multilayer feed-forward networks are one of the most used neural networks in various domains because of their universal approximation capability. Back-propagation (BP) uses two phases, feed-forward and ...
  • Soe, Yan Naung; Oo, Khine Khine (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The software defect can cause the unnecessary effects on the software such as cost and quality. The prediction of the software defect can be useful for the developing of good quality software. For the prediction, the PROMISE ...
  • Sin, Yi Mon Shwe; Thein, Thin Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper implements the planning ceremony by using decision tree induction algorithm. Nowadays, ceremonies are held by many people in various form such as wedding, birthday, promotions, award and so on. Since there are ...
  • Tun, Than Lin; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Since the introduction of computer system, decision support has evolved greatly. Originally computer systems produced paper reports. The emerging technologies of data warehousing and OLAP have changed the way that organization ...
  • Oo, Myat Noe; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Electronic commerce (e-commerce) has changed the outlook of traditional business trading behavior. E-commerce includes different types of activities related to the online sales of goods and services. In this paper, ...
  • Hnin, Thuzar; Oo, Khine Khine (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Today’s many modern organizations, to get competitive advantages, have been already implemented business process management (BPM). However, as part of a larger business process management initiative, especially predictive ...
  • San, Aye Aye; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-based reasoning (CBR) has become a successful technique for developing medical diagnosis systems. CBR is an approach to knowledge-based problem solving and decision support. This paper presents CBR methodology and ...
  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Win, Chaw Su; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Web pages consist of both informative and non-informative content for the users. Web Page Indexing System, Web Page Classification and Clustering System and Web Information Extraction System that help the users to support ...
  • Win, Sandar; Thein, Thin Lai Lai (Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020), 2020-02-28)
    The recognition of 3D human pose from 2D joint location is fundamental to numerous vision issues in analysis of video sequences. Various methods using with skeletal model have been described in past decades, but there ...
  • Htwe, Thanda; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Most of the Web page typically contains clutter unlike conventional data or text. It usually has such noise data as navigation panels, copyright and privacy notices, and advertisement. These noise data can seriously ...
  • Mon, Aye Chan; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Entity Resolution is the task of identifying duplicated records that refer to the same real-world entity. It is costly process that can take up to days for large datasets. Various Blocking Methods have been applied in ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, scheduling problems such as employee scheduling, university timetabling, arise in almost all areas of human activity. In the literature, there are many methods to solve it. Some of the most effective techniques ...
  • Myint, Zin Thu Thu; Tun, Myint Thu Zar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Personal Learning Environment (PLE) technology is centered on the concept of self-regulated learning that creates responsible learners, who are capable of critical thinking and able to plan their own learning processes. ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Thuzar, Pyae Phyo; Kham, Nang Saing Moon (2017-12-27)
    Multilayer feedforward networks are one of the most used neural networks in various domains because of their universal approximation ability. One of the popular algorithms for training multilayer feedforward network ...

Search Repository



Browse

My Account