UCSY's Research Repository

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Sort by: Order: Results:

  • Win, May Thu; Win, Kay Thi (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Interactive image segmentation has many applications in image processing, computer vision, computer graphics and medical image analysis. In medical applications, image segmentation is a fundamental process in most systems ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As the internet evolves and computer networks become bigger and bigger, network security is one of the most challenging issues in today's world that touches many areas using network communication. Nowadays, there is a ...
  • NGETH, Rithea; TAN, Yasuo; LIM, Yuto; Lin, Nyan (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper presents the introduction of network coding technique into the data gathering process of cluster-based wireless sensor networks (WSNs), which possess the limited energy and computing resources. The network ...
  • Win, Yin Yin; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is the morphologically rich and highly agglutinative language. The morphologi-cal synthesizer and analyzer are required for machine translation of English to Myanmar language. This paper the development ...
  • Khaing (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Enterprise resource planning (ERP) system has been one of the most popular business management systems, providing benefits of real-time capabilities and seamless communication for business in large organizations. ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Road traffic congestion is major problem in urban area of both developing and developed countries. In order to reduce this problem, traffic congestion states of road networks are estimated so that congested road can ...
  • Phyo, Aye Su; Tun, Khin Nwe Ni (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Binarization is one of sub phases of preprocessing step of optical character recognition (OCR). Binarization is separation of foreground text from background of document image. The accuracy of OCR mainly relies on ...
  • Yuichi, Okuyama; Mitsuhiro, Nakamura (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    We implement new arithmetic unit for matrix operation named matrix FMA. This unit read three matrices at one cycle and output the result of 𝐴𝐵+𝐶f in every cycle. We employ this unit to array processor for matrix ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    With the enormous growth of computer networks, network security is gaining increasing importance. Therefore, the role of Intrusion Detection Systems (IDSs) is becoming more important. There are many techniques ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only ends users applications ...
  • Soe, Nwe Nwe; Htay, Win (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper offers finding the region of interest and automatic cropping from palm leaf manuscripts developed by using one-dimensional segmentation. This system can be used to provide for enhancing palm leaf manuscripts ...
  • Aung, Nay Aung; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Cloud storage forensics has recently emerged as a salient area of inquiry. One area of difficulty is the identification and acquisition of potential data when disparate services can be utilized by criminals. There is ...
  • Aye, Nilar; Naing, Thinn Thu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper proposes a framework to construct a knowledge base by using crowdsourcing approach. The various inputs have been asserted into database interactively by crowd of people via internet. The support of travel ...
  • Ohsawa, Yutaka; Htoo, Htoo; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Vicinity queries include set k nearest neighbor (SetkNN) query, ordered k nearest neighbor (OrderkNN) query, bi-chromatic reverse nearest neighbor (BRkNN) query and distance range query. In existing approaches, each ...
  • Khine, Myat Thiri; Sein, Myint Myint; Aung, Su Nandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Geographic query is composed of query keywords and a location. Spatial keyword queries which are queries on spatial objects associated with textual attributes have received significant attention in geographic ...
  • Soe, Wunna; Thein, Yadana (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In this paper a grammatical-based word segmentation algorithm is presented. As the nature of Myanmar language, word segmentation process is necessary for machine translation, speech recognition, speech synthesis, etc. ...
  • Khing, Yadanar; Sein, Myint Myint; Win, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Handwriting authentication is considered as the most natural method of authenticating a person’s identity compared to other biometric and cryptographic forms of authentication. It involves specialize human skills and ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...

Search Repository



Browse

My Account