UCSY's Research Repository

Faculty of Information Science

Faculty of Information Science

 

Collections in this community

Recent Submissions

  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • San, Aye Aye; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-based reasoning (CBR) has become a successful technique for developing medical diagnosis systems. CBR is an approach to knowledge-based problem solving and decision support. This paper presents CBR methodology and ...
  • Aung, Myat Soe; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case based reasoning (CBR) is very important subfield of artificial intelligence which is growing rapidly. CBR based applications are used very commonly in many different fields. In this paper, we present classification ...
  • Lin, May Phyo Wai; Oo, Khine Khine (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The goal of the proposed system is to derive models for forecasting the final price of ongoing auction. The forecasting task is important not only to the participants of an auction who compete against each other for the ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Today, Hyper-Heuristic is not new in AI Field. It is an emerged search technology to select or generate (new) low level heuristics for combinatorial optimization problem and has been applied in many problem domains: personal ...
  • Sint, Hla Sann; Oo, Khine Khine (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    In today's hyper-connected society, understanding the mechanisms of trust is crucial. Trust issues are critical to solving problems. Trust phenomenon has been extensively explored by a variety of disciplines across the ...
  • Mon, Soe Soe; Kham, Nang Saing Moon; Aung, Than Htike (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    In current years, there have been development of the number of intelligent tools based Radio Frequency Identification (RFID). RFID systems have been used successfully working to many areas such as transport, health ...
  • Mon, Shun Ei; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Recommender systems on web pages are a subclass of information filtering system that seeks the relevant web pages according to prediction of the 'rating' or 'preference' that a user would give web page. Nowadays, the ...
  • Thwin, Aye Theingi; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Data mining methods are used to discover the behaviour of the users. Therefore, the data used for the mining purpose must be qualified for the data cleaning stage and must be considered and planned efficiently to meet ...
  • Hlaing, Ei Mon; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Today’s websites are having a lot of small parts or details arranged in a complicated way and are therefore sometimes difficult to understand for the visitors.The web sites designers are faced with increasing ...
  • Thuzar, Pyae Phyo; Kham, Nang Saing Moon (2017-12-27)
    Multilayer feedforward networks are one of the most used neural networks in various domains because of their universal approximation ability. One of the popular algorithms for training multilayer feedforward network ...
  • Zune, Sheilar; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Database security and integrity are essential aspects of an organization’s security posture. Database security is the system, processes, and procedures that protect a database from unintended activities. It is important ...
  • Htay, Hsu Myat; Oo, Khine Khine (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The Abhidhamma is one of the three parts of the Pali cannon, the Tipitaka, the main texts of Theravada Buddhism and is sometimes described as ‘Buddhist Psychology’ [2]. Human mind is consciousness (citta) and mental ...
  • Han, Wai Wai; Oo, Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Requirements elicitation is vital importance in system development process. While doing software system development, the stakeholders can’t states real and nearly complete requirements because they might not know what ...
  • Mon, Su Su; Oo, Dr.Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A distributed database is a database with its data elements stored at several sites of a computer network. Certain data items may be redundantly stored at more than one site for reliability reasons. A replicated database ...
  • Hlaing, May Me Me; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the process of analyzing large data sets in order to find patterns. Mining frequent patterns is a fundamental and crucial task in data mining problems. The association rule mining is needed in order to ...
  • Mhon, Gant Gaw Wutt; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Web usage mining is the discovery of user access patterns from Web usage logs. The paper presents two XML (Extensible Markup Language) 1.0 applications and a web data mining application which utilizes it to extract web ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • Win, Nay Aung Soe; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Big data in terms is the huge volume of data that is difficult to be processed, handled and managed. The term big data is an emerging trend where a number of researches and data scientists are carried out for data ...

View more