UCSY's Research Repository

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Sort by: Order: Results:

  • Myint, Khin Khattar; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    With the enormous growth of computer networks, network security is gaining increasing importance. Therefore, the role of Intrusion Detection Systems (IDSs) is becoming more important. There are many techniques ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only ends users applications ...
  • Soe, Nwe Nwe; Htay, Win (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper offers finding the region of interest and automatic cropping from palm leaf manuscripts developed by using one-dimensional segmentation. This system can be used to provide for enhancing palm leaf manuscripts ...
  • Aung, Nay Aung; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Cloud storage forensics has recently emerged as a salient area of inquiry. One area of difficulty is the identification and acquisition of potential data when disparate services can be utilized by criminals. There is ...
  • Aye, Nilar; Naing, Thinn Thu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper proposes a framework to construct a knowledge base by using crowdsourcing approach. The various inputs have been asserted into database interactively by crowd of people via internet. The support of travel ...
  • Ohsawa, Yutaka; Htoo, Htoo; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Vicinity queries include set k nearest neighbor (SetkNN) query, ordered k nearest neighbor (OrderkNN) query, bi-chromatic reverse nearest neighbor (BRkNN) query and distance range query. In existing approaches, each ...
  • Khine, Myat Thiri; Sein, Myint Myint; Aung, Su Nandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Geographic query is composed of query keywords and a location. Spatial keyword queries which are queries on spatial objects associated with textual attributes have received significant attention in geographic ...
  • Soe, Wunna; Thein, Yadana (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In this paper a grammatical-based word segmentation algorithm is presented. As the nature of Myanmar language, word segmentation process is necessary for machine translation, speech recognition, speech synthesis, etc. ...
  • Khing, Yadanar; Sein, Myint Myint; Win, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Handwriting authentication is considered as the most natural method of authenticating a person’s identity compared to other biometric and cryptographic forms of authentication. It involves specialize human skills and ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Nyo, Khin Mar; Win, Khine Zar Ne (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In the process of developing software and fulfilling to the current trends, every modularized concern needs Extensibility, Changeability, Design Stability and Sustainability. Our study implements the software metrics ...
  • Mon, Khin Lay; War, Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Automatic image segmentation is a very important task for image analysis, object detection and recognition tasks. In this research, automatic image segmentation system is proposed which includes three main approaches: ...
  • Maw, Myint Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior… It is a disciplined way to clean up code that minimizes the chances ...
  • Win, Ei Phyu; Aye, Nyein (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Biometrics is a method for recognizing based on physiological and behavioral characteristics. Iris recognition is one of the robust biometric technologies used for authentication applications. An iris recognition system ...
  • War, Nu; Lwin, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electroencephalogram (EEG) signal is an important source of information for knowing brain processes. To interpret the brain activity, Matching Pursuit Based EEG signal classification is proposed. This system includes three ...
  • Zan, Thu Thu; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural disaster cannot be prevented, but its impacts can be eliminated or reduced. Mobile devices are the most effective and convenient communication tools which are not restricted by time and place. In this paper, ...
  • Hlaing, Zar Chi Su Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Ant Colony Optimization (ACO) is a useful approach for finding near optimal solutions in polynomial time for Nondeterministic Polynomial time (NP) problems. Traveling salesman problem (TSP) is a typical NP hard problem ...
  • Aung, Win Win (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Overclocking method is the most popular method used by the users who want to perform the processing speed beyond the manufacturer’s limit. When client server computing becomes useful for all environments in order to ...
  • Nyo, Nyein Nyein; Kyaw, Thae Naw Naw (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Spam is one of the main problems in e-mails communication. Naïve Bayesian (NB) learning is useful algorithm for constructing Myanmar spam corpus (SCorpus) from pre-defined spam and ham e-mails. SCorpus is built on ...

Search Repository



Browse

My Account