UCSY's Research Repository

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Issue Date

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Issue Date

Sort by: Order: Results:

  • Lwin, Wai Wai; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The largest shared information source, the World Wide Web has been increasing a tremendous proliferation in the amount of information rapidly. As a result of its huge sharing and highly dynamic data, there is a ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only ends users applications ...
  • Mon, Khin Lay; War, Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Automatic image segmentation is a very important task for image analysis, object detection and recognition tasks. In this research, automatic image segmentation system is proposed which includes three main approaches: ...
  • Win, Yin Yin; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is the morphologically rich and highly agglutinative language. The morphologi-cal synthesizer and analyzer are required for machine translation of English to Myanmar language. This paper the development ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...
  • Kyaw, Theingi; Htun, Zaw (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile phone based activity recognition uses data obtained from embedded sensors to infer user’s physical activities. Therefore, many mobile phones have been equipped with sensors to enable the delivery of advanced ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Phyo, Aye Su; Tun, Khin Nwe Ni (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Binarization is one of sub phases of preprocessing step of optical character recognition (OCR). Binarization is separation of foreground text from background of document image. The accuracy of OCR mainly relies on ...
  • War, Nu; Lwin, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electroencephalogram (EEG) signal is an important source of information for knowing brain processes. To interpret the brain activity, Matching Pursuit Based EEG signal classification is proposed. This system includes three ...
  • NGETH, Rithea; TAN, Yasuo; LIM, Yuto; Lin, Nyan (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper presents the introduction of network coding technique into the data gathering process of cluster-based wireless sensor networks (WSNs), which possess the limited energy and computing resources. The network ...
  • Aung, Nay Aung; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Cloud storage forensics has recently emerged as a salient area of inquiry. One area of difficulty is the identification and acquisition of potential data when disparate services can be utilized by criminals. There is ...
  • Zaw, San Kyaw; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The evolution of web has positively transformed the paradigm of communication, trading, and collaboration for the benefit of humanity. However, these benefits of the Web are shadowed by cyber-criminals who use the Web ...
  • Khine, Kyi Lai Lai; Nyunt, Thi Thi Soe (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Big Data Predictive Analytics is influenced in the financial market mainly in stock exchange with its emerging technologies. Stock Market Prediction has always been one of the hottest topics in research, as well as a ...
  • Khaing (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Enterprise resource planning (ERP) system has been one of the most popular business management systems, providing benefits of real-time capabilities and seamless communication for business in large organizations. ...
  • Hlaing, Zar Chi Su Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Ant Colony Optimization (ACO) is a useful approach for finding near optimal solutions in polynomial time for Nondeterministic Polynomial time (NP) problems. Traveling salesman problem (TSP) is a typical NP hard problem ...
  • Maung, Hsu Mon; Win, Kay Thi (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Web application testing has been used in finding various faults in order to improve the quality of reliable web services. Among test cases generation approaches, user session based testing is an approach to create test ...
  • Khing, Yadanar; Sein, Myint Myint; Win, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Handwriting authentication is considered as the most natural method of authenticating a person’s identity compared to other biometric and cryptographic forms of authentication. It involves specialize human skills and ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Shwe, Lae Lae; Theint, Khant Kyawt Kyawt; Sein, Myint Myint; Thein, Thin Lai Lai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    3-D reconstruction of buildings in urban areas is one of the highlighted issues in photogrammetry, remote sensing, computer vision, and computer graphic. It can be used in various fields such as urban planning, construction, ...
  • Aye, Zin Win; Mon, Myat Thida (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, wireless networks which offer various multimedia services to mobile users are demanding Quality of Services (QoS) for these services. Therefore, defining optimal queue size of various mixed applications at ...

Search Repository



Browse

My Account