UCSY's Research Repository

Browsing by Issue Date

Browsing by Issue Date

Sort by: Order: Results:

  • Htun, Aung Khine; Latt, Win Zaw; Naing, Thin Thu (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Disk scheduling problem has theoretical interest and practical importance since, the processor speed and memory capacity have been progressing several times faster than disk speed. Disk I/O performance will become an ...
  • Maw, Zin Zin; Mya, Khin Than (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    XML (Extensible Markup Language) is a general-purpose specification for creating custom markup languages. XML Encryption provides end-to-end security for applications that require secure exchange of structured data. XML-based ...
  • Than, Khin Moh Moh (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Digital cash need both customers and merchants. Authentication provided by unforgeable digital signatures in order to prevent forgery and transact with confidence. The security of electronic commerce is important issue for ...
  • Win, Theingi; Khin, Tar Tar (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Queuing theory, a mathematical formula used by operations management experts in many fields like airlines, banks, super markets, production lines and most service delivery organizations. It is one of the most critical tools ...
  • Kyaw, Pyae Phyo; Kham, Nan Si (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    There are several local service systems in our country such as hotel reservation system, car rental system, local trip agency, goods delivery system and so on. Among of them, local trip service system can also aid the ...
  • Shwe, Saw Thandar; Win, Yu Ya (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Case-based Reasoning (CBR) is a problem solving approach, one of the AI machine learning techniques. The basic idea of CBR is to solve new problems by comparing them to old problems, which have already been solved in the ...
  • Cho, Tin Tin (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    This paper tends to develop a performance evaluation management system of training to support the management which increase the knowledge and empower of the trainee .By providing training staff opportunity to demonstrate ...
  • Tun, Wai Wai; Aung, Sint Sint (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Electronic voting is an application of cryptography. An electronic voting system has been developed which offers the necessary guarantees in terms of legitimacy, security, anonymity and secrecy both in the voting process ...
  • Win, Cho Cho (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Information has become extremely important for every business area. To get a huge amount accurate information and making decisions after analyzing these is of great value to those who do business. In clinical environment, ...
  • Aung, Ei Khine Zin; Kham, Nang Saing Moon (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Web Usage Mining (WUM) integrates the techniques of two popular research fields - Data Mining and the Internet. By analyzing the potential rules hidden in web logs, WUM helps personalize the delivery of web content and ...
  • Ko, Su Hteik (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    In this paper, an approach for implementing Myanmar Spoken Digit Recognition is described. While the literature on speech recognition is based on the variety of methods, the present system is implemented by Elman recurrent ...
  • Swe, Mya Thuzar; Nyunt, Thi Thi Soe; Khaing, Myo (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Storage of data and the retrieval of stored data in the required format has become the major activity in database applications. Such information systems provide user interfaces in a number of ways including query ...
  • Pyone, Thida; Khine, May Aye (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    This system investigates the effect of learning curves on the basic models of inventory management. This system describes learning curves in setup costs, and derived new formulas for the lot size and inventory costs. The ...
  • Thuai, Khaing Mar; Thant, Moe (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Decision Tree algorithms are the most popular algorithms for classification in data mining field. The main goal of classification is prediction of the categorical labels (classes). In this system, ID3 algorithm is used to ...
  • Khaing, Aye Myat (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Classification is a supervised learning method that includes a classification model from a database and is one of the most common applied data mining task. The genetic algorithms (GAs) provide an approach to learning that ...
  • Tun, Zin Mar; Han, Ei Ei (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Software agents help to automate a variety of tasks involving in buying and selling products over the Internet. Agent Technology is suitable for people to buy goods in online market by automating the shopping process. The ...
  • Moe, Lwin Lwin; Kham, Nang Saing Moon (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Recent growth in the use of email for communication and the corresponding growth in the volume of email received have made automatic processing of email desirable. The importance of email as a mean of communication has ...
  • Khin, Myo Myo; Oo, May Thandar (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Nowadays, Information tecnology is playing on ever increasing role in business strategy. Large investments in technology involving networks supporting data processing, telecommunicating and office automation require ...
  • Phyu, Pearl Su (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Proximity Search is successfully used in Information Retrieval (IR) System to query the keywords that occurring near each other. This system implemented the web based on approximate search and proposed on the client server ...
  • Aung, Moe Moe; Maw, Soe Yu (Seventh International Conference On Computer Applications (ICCA 2009), 2009-02-26)
    Performing business these days represents one of the most important and competitive factors for the majority of companies. It ensures access to considerably larger markets, better recognition of the company and a ...

Search Repository

Browse

My Account