UCSY's Research Repository

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Sort by: Order: Results:

  • Khing, Yadanar; Sein, Myint Myint; Win, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Handwriting authentication is considered as the most natural method of authenticating a person’s identity compared to other biometric and cryptographic forms of authentication. It involves specialize human skills and ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Nyo, Khin Mar; Win, Khine Zar Ne (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In the process of developing software and fulfilling to the current trends, every modularized concern needs Extensibility, Changeability, Design Stability and Sustainability. Our study implements the software metrics ...
  • Mon, Khin Lay; War, Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Automatic image segmentation is a very important task for image analysis, object detection and recognition tasks. In this research, automatic image segmentation system is proposed which includes three main approaches: ...
  • Maw, Myint Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior… It is a disciplined way to clean up code that minimizes the chances ...
  • Win, Ei Phyu; Aye, Nyein (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Biometrics is a method for recognizing based on physiological and behavioral characteristics. Iris recognition is one of the robust biometric technologies used for authentication applications. An iris recognition system ...
  • War, Nu; Lwin, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electroencephalogram (EEG) signal is an important source of information for knowing brain processes. To interpret the brain activity, Matching Pursuit Based EEG signal classification is proposed. This system includes three ...
  • Zan, Thu Thu; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural disaster cannot be prevented, but its impacts can be eliminated or reduced. Mobile devices are the most effective and convenient communication tools which are not restricted by time and place. In this paper, ...
  • Hlaing, Zar Chi Su Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Ant Colony Optimization (ACO) is a useful approach for finding near optimal solutions in polynomial time for Nondeterministic Polynomial time (NP) problems. Traveling salesman problem (TSP) is a typical NP hard problem ...
  • Aung, Win Win (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Overclocking method is the most popular method used by the users who want to perform the processing speed beyond the manufacturer’s limit. When client server computing becomes useful for all environments in order to ...
  • Nyo, Nyein Nyein; Kyaw, Thae Naw Naw (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Spam is one of the main problems in e-mails communication. Naïve Bayesian (NB) learning is useful algorithm for constructing Myanmar spam corpus (SCorpus) from pre-defined spam and ham e-mails. SCorpus is built on ...
  • Naing, May Thu; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In today’s era, when the size of information and data is increasing exponentially, there is an upcoming need to create a concise version of the information available. This paper presents a summary generation system ...
  • Phyu, Myat Sapal; Thant, Win Win; Zin, Thet Thet (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Lexicographic sorting is the task of arranging an unordered collection of words into increasing or decreasing order.The main objective of this paper is to develop Myanmar lexicographic sorting method in Myanmar traditional ...
  • Aye, Zin Win; Mon, Myat Thida (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, wireless networks which offer various multimedia services to mobile users are demanding Quality of Services (QoS) for these services. Therefore, defining optimal queue size of various mixed applications at ...
  • Phyo, K-zin; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Urban fire is one of the most ordinary problems in all nations. Fire can cause serious damages to people and properties. When the fire event occurred, it is extremely important to reach the fire vehicles to incident ...
  • Chaw, Hnin Thiri; Thuzar, Myat; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In recent year, the transportation networks are becoming more and more complex and navigation services are increasingly necessary for the people living in the modern society. One of the requirements in the cities of ...
  • Thu, Ye Kyaw; Ding, Chenchen; Utiyama, Masao; Sumita, Eiichiro (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As Myanmar (Burmese) and Japanese share similar syntactic structures, we explore an approach for parsing Myanmar by using Japanese as a pivot. Specifically, we first apply a statistical machines translation (SMT) system ...
  • Shin, Han Sol; Yu, Taejun; Lee, Kun (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Plasma based particle accelerator has mainly used in nuclear field only because of the large scale of the facility. However, since laser-plasma particle accelerator which has smaller size and spends less cost. ...
  • Latt, Tin Myo; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural language processing is normally used to describe the function of computer system which analyze or synthesize spoken or written language. One area of Natural language processing is concerned with creating proofing ...

Search Repository



Browse

My Account