![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2020
- Zayar Aung, Ye Thu Aung, Mihaylov Ilya Sergeevich, Phyo Wai Linn:
The implementation of support vector machines for solving in oil wells. ICCA 2020: 1-5 - Wai Phyo Aung, Htar Htar Lwin, Kyaw Kyaw Lin:
Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar. ICCA 2020: 1-6 - Thet Thet Aung, Thi Thi Soe Nyunt:
Community Detection in Scientific Co-Authorship Networks using Neo4j. ICCA 2020: 1-6 - Hay Mar Su Aung, Win Pa Pa:
Analysis of Word Vector Representation Techniques with Machine-Learning Classifiers for Sentiment Analysis of Public Facebook Page's Comments in Myanmar Text. ICCA 2020: 1-7 - Myat Aye Aye Aung, Win Pa Pa:
Time Delay Neural Network for Myanmar Automatic Speech Recognition. ICCA 2020: 1-4 - Zayar Aung, Mihailov Ilya Sergeevich, Ye Thu Aung:
Data Mining to Solve Oil Well Problems. ICCA 2020: 1-5 - Nay Win Aung, Thin Lai Lai Thein:
Vehicle Accident Detection on Highway and Communication to the Closest Rescue Service. ICCA 2020: 1-7 - Si Thu Aung, Thandar Thein:
Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks. ICCA 2020: 1-5 - Thepparit Banditwattanawong
, Masawee Masdisornchote:
Norm-Referenced Achievement Grading of Normal, Skewed, and Imperfectly Normal Distributions Based on Machine Learning versus Statistical Techniques. ICCA 2020: 1-8 - Pyae Pyae Win Cho, Thi Thi Soe Nyunt:
An Improved Differential Evolution Algorithm with Opposition-Based Learning for Clustering Problems. ICCA 2020: 1-5 - U. Sai Saw Han:
Information Security Risk Management in Electronic Banking System. ICCA 2020: 1-6 - Zar Chi Su Su Hlaing, Myo Khaing:
A Detection and Prevention Technique on SQL Injection Attacks. ICCA 2020: 1-6 - May Me Me Hlaing, Nang Saing Moon Kham:
Defining News Authenticity on Social Media Using Machine Learning Approach. ICCA 2020: 1-6 - Than Than Htay, Sabai Phyu:
Improving the performance of Hadoop MapReduce Applications via Optimization of concurrent containers per Node. ICCA 2020: 1-5 - Khaing Suu Htet, Myint Myint Sein:
Market Intelligence Analysis on Age Estimation and Gender Classification on Events with deep learning hyperparameters optimization and SDN Controllers. ICCA 2020: 1-5 - Honey Htun, Ye Kyaw Thu, Nyein Nyein Oo, Thepchai Supnithi:
A Study of Myanmar (Burmese) to English Machine Translation Performance with Various Myanmar Translated Styles. ICCA 2020: 1-7 - Myint Soe Khaing, Yee Mon Thant, Thazin Tun, Chaw Su Htwe, Mie Mie Su Thwin:
IoT Botnet Detection Mechanism Based on UDP Protocol. ICCA 2020: 1-7 - Naing Naing Khin, Khin Mar Soe:
University Chatbot using Artificial Intelligence Markup Language. ICCA 2020: 1-5 - Aye Aye Khine, Hint Wint Khin:
Credit Card Fraud Detection Using Online Boosting with Extremely Fast Decision Tree. ICCA 2020: 1-4 - Aye Aye Khine, Hint Wint Khin:
Credit Card Fraud Detection Using Online Boosting with Extremely Fast Decision Tree. ICCA 2020: 1-4 - San Nyein Khine, Zaw Tun:
Mongodb on Cloud for Weather Data (Temperature and Humidity) in Sittway. ICCA 2020: 1-6 - Phyo Thu Thu Khine, Htwe Pa Pa Win:
Ensemble Framework for Big Data Stream Mining. ICCA 2020: 1-5 - Lett Yi Kyaw, Sabai Phyu:
Scheduling Methods in HPC System: Review. ICCA 2020: 1-6 - Htar Htar Lwin, Wai Phyo Aung, Kyaw Kyaw Lin:
Comparative Analysis of Android Mobile Forensics Tools. ICCA 2020: 1-6 - Hay Mar Mo Mo Lwin, Yutaka Ishibashi, Khin Than Mya:
Influence of Voice Delay on Human Perception of Group Synchronization Error for Remote Learning : One-way Communication Case. ICCA 2020: 1-5 - San San Maw:
An Improvement of FP-Growth Mining Algorithm Using Linked list. ICCA 2020: 1-4 - Gant Gaw Wutt Mhon, Nang Saing Moon Kham:
ETL Preprocessing with Multiple Data Sources for Academic Data Analysis. ICCA 2020: 1-5 - Myint Myint Moe
, Khine Khine Oo:
Consequences of Dependent and Independent Variables based on Acceptance Test Suite Metric Using Test Driven Development Approach. ICCA 2020: 1-6 - Myat Thida Mon:
Flow Collision Avoiding in Software Defined Networking. ICCA 2020: 1-5 - Pau Suan Mung, Sabai Phyu:
Effective Analytics on Healthcare Big Data Using Ensemble Learning. ICCA 2020: 1-4
skipping 20 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-28 06:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint