UCSY's Research Repository

Browsing Faculty of Information Science Collection by Title

Browsing Faculty of Information Science Collection by Title

Sort by: Order: Results:

  • Mon, Shun Ei; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Recommender systems on web pages are a subclass of information filtering system that seeks the relevant web pages according to prediction of the 'rating' or 'preference' that a user would give web page. Nowadays, the ...
  • Lwin, Wai Wai; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The World Wide Web, the largest shared information source is growing exponentially and the amount of business news on the web is overwhelming and need to be handled properly. As such, grouping the web document into ...
  • Win, Htet Htet (University of Computer Studies, Yangon, 2019-01)
    Information applications are widely used by millions of users to perform many different activities. Android-based smart phone users can get free applications from Android Application Market. But, these applications were ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Physical activity is an essential component of a healthy lifestyle. It is clear that physically active people have a lower disease risk than sedentary individuals. Thus the measurement for physical fitness becomes the ...
  • Lin, May Phyo Wai; Oo, Khine Khine (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The goal of the proposed system is to derive models for forecasting the final price of ongoing auction. The forecasting task is important not only to the participants of an auction who compete against each other for the ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Win, Su Su; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’queries ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In information retrieval, the users’ queries often vary a lot from one to another. Most IR systems use a single fixed ranking strategy to support the information seeking task of all users for all queries irrespective ...
  • Kham, Nang Saing Moon; Thin, Lwin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new ...
  • Win, Sandar; Thein, Thin Lai Lai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Nowadays, real-time information is very important and learning based human motion has fascinated range from detection to tracking state in Computer Vision. In this system, the real-time videos are used to detect, track, ...
  • Oo, Nwe Ni; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recommender systems use the opinions of a community of users to help individuals in that community more effectively identify content of interest from a potentially overwhelming set of choices. One of the most successful ...
  • Zaw, Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    HDFS (Hadoop Distributed File System) is designed to store big data reliably, and it has been distributed file. However, it is not replacement for failure nodes. Replication technology is a key component in every computing ...
  • Htay, Hsu Myat; Oo, Khine Khine (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The Abhidhamma is one of the three parts of the Pali cannon, the Tipitaka, the main texts of Theravada Buddhism and is sometimes described as ‘Buddhist Psychology’ [2]. Human mind is consciousness (citta) and mental ...
  • San, Khine Aye; Thein, Thin Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper implements the waiting line of clinic by using Queuing Theory to save the time-limit. The system is using the multiple queue line. One is for emergent patients, one is for old patients, another one is for new ...
  • Yar, Kay Thi; Tun, Khin Mar Lar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for ...
  • Nwe, Win Hay Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Conventional database query methods are inadequate to extract useful information from huge data banks. Cluster analysis is one of the major data analysis methods, and process of grouping a set of physical or abstract ...
  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...

Search Repository



Browse

My Account