UCSY's Research Repository

Browsing Thirteenth International Conference On Computer Applications (ICCA 2015) by Title

Browsing Thirteenth International Conference On Computer Applications (ICCA 2015) by Title

Sort by: Order: Results:

  • Aung, Swe Swe; Naing, Thinn Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    As Traffic congestion is becoming an everyday facing problem in urban region, monitoring road and Traffic prediction system are playing an important role in the city life. The previous Traffic Prediction Systems were ...
  • Jeong, Sang-Mo; Jeong, Sung-Woo; Kim, Hyung-Woo; Jeong, Yung-Kyun (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Current trend in Construction Technology is to integrate with ICT (Information & Communication Technology). BIM(Building Information Modeling) is one of the most conspicuous applications of ICT into Construction Field ...
  • Moe, Khaing Cho; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Rapid urbanization and urban growth is continuing to be one of the crucial issues of global change affecting physical dimensions of cities. In this study, building growth change detection is investigated as buildings ...
  • Myint, May Thu (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    The large quantities of information in both audio and video is a great need for efficient ways of searching and retrieving relevant information. The goal of an audio indexing is to provide the capability of searching ...
  • Thwe, Khine Zar; Khaing, Phyu Phyu (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Cloud computing is a term to deliver software, storage and processing. It increases system’s capability without changing the existing infrastructure, educating new people or taking license for the software. It improves ...
  • Aung, Nay Aung; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    There are various types of cloud services with each type having a potentially different use in criminal activity. The storage as a service (StaaS) is showing significant growth as users adopt the capability to store data ...
  • Win, Khin Cho (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The security of data transferring is accepted as the challenging problem all over the world. In this system, the image file of any kinds of format is encrypted by using S-DES (Simplified Data Encryption Standard) in ...
  • Hnin, Than Thida; Lynn, Khin Thidar (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Taxonomy is the science of naming, describing and classifying organisms that includes all plants, animals and microorganisms of the world. Using morphological, behavioral, genetic information and biochemical observations, ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • San, Thinn Htet Htet; Khin, Mie Mie (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    With the incidence of severe weather and flooding on the increase around the world, there is a need to improve flood forecasting and warning. Floods cause physical damage, loss of basic sanitation that leads to disease, ...
  • Win, Kyaw Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Cloud computing technology becomes most popular in modern technology environment. Users store their data on third-party storage, cloud storage provider. In this case, security concerns arise to protect their stored ...
  • Baral, Amit Raj; Koshiba, Takeshi (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Increasing dependency of data availability and the fear of losing the private information during com- munication motivate the need of privacy protection. One of the common problems occurs when two par- ties need to ...
  • Aye, Nyein; Aung, Sandar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The system is aimed to develop the 3D model reconstruction from multi stereo images. In this paper, an efficient depth computing based on stereo matching algorithm is introduced based on feature extraction with ...
  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Win, Khine Zar Ne; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The rapid growth of aspect-oriented applications increases the need to evaluate these applications. In the past, the software attributes have been tried to subjectively and objectively evaluate for the object-oriented ...
  • Aung, Su Nandar; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Spatial keyword search on spatial database has been well studied for years due to its importance to commercial search engines.Specially, a spatial keyword query takes a user location and user-supplied keywords as ...
  • Thu, Pyae Phyo; Lynn, Khin Thidar (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Road traffic jams continue to remain a major problem in most cities around the world, especially in developing countries.Congested roads can be avoided by estimating the real time road traffic conditions. In this paper, ...
  • Win, Zin Mar; Aye, Nyein (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    The explosion of Image spam emails has prompted the development of numerous spam filtering techniques. This paper proposes an efficient image spam filtering system using three methods. The first method, File ...
  • Thein, Khant Kyaw Kyawt; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper handles a robust method to handle matching problem of the 3D building from remote sensed images, where two or more images are captured from the different views without any camera information. The system is ...

Search Repository



Browse

My Account