Fourteenth International Conference On Computer Applications (ICCA 2016): Recent submissions

  • Latt, Tin Myo; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural language processing is normally used to describe the function of computer system which analyze or synthesize spoken or written language. One area of Natural language processing is concerned with creating proofing ...
  • Naing, May Thu; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In today’s era, when the size of information and data is increasing exponentially, there is an upcoming need to create a concise version of the information available. This paper presents a summary generation system ...
  • Zan, Thu Thu; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural disaster cannot be prevented, but its impacts can be eliminated or reduced. Mobile devices are the most effective and convenient communication tools which are not restricted by time and place. In this paper, ...
  • Win, Ei Phyu; Aye, Nyein (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Biometrics is a method for recognizing based on physiological and behavioral characteristics. Iris recognition is one of the robust biometric technologies used for authentication applications. An iris recognition system ...
  • Mon, Khin Lay; War, Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Automatic image segmentation is a very important task for image analysis, object detection and recognition tasks. In this research, automatic image segmentation system is proposed which includes three main approaches: ...
  • Aye, Nilar; Naing, Thinn Thu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper proposes a framework to construct a knowledge base by using crowdsourcing approach. The various inputs have been asserted into database interactively by crowd of people via internet. The support of travel ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    With the enormous growth of computer networks, network security is gaining increasing importance. Therefore, the role of Intrusion Detection Systems (IDSs) is becoming more important. There are many techniques ...
  • Phyo, Aye Su; Tun, Khin Nwe Ni (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Binarization is one of sub phases of preprocessing step of optical character recognition (OCR). Binarization is separation of foreground text from background of document image. The accuracy of OCR mainly relies on ...
  • Khaing (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Enterprise resource planning (ERP) system has been one of the most popular business management systems, providing benefits of real-time capabilities and seamless communication for business in large organizations. ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As the internet evolves and computer networks become bigger and bigger, network security is one of the most challenging issues in today's world that touches many areas using network communication. Nowadays, there is a ...
  • Zaw, San Kyaw; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The evolution of web has positively transformed the paradigm of communication, trading, and collaboration for the benefit of humanity. However, these benefits of the Web are shadowed by cyber-criminals who use the Web ...
  • Yu, Thanda Tin (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Social network analysis has undergone a renaissance with the ubiquity and quantity of content from social media, web pages, and sensors. This content is a rich data source for constructing and analyzing social networks. ...
  • Hsan, Nu War; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Due to uncontrolled exponential growth in web data, knowledge based retrieval has become a challenging task. The one viable solution to the problem is the merging of conventional web mining with semantic technologies. There ...
  • Lwin, Wai Wai; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The largest shared information source, the World Wide Web has been increasing a tremendous proliferation in the amount of information rapidly. As a result of its huge sharing and highly dynamic data, there is a ...
  • Aye, Nilar; San, Pan Ei (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The web content classification system classifies the noise or content from HTML web pages. The system proposes the Content Extraction algorithm using content features to remove the boilerplate and to extract the main ...
  • Mon, Ei Ei; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electronic mail is used daily by millions of people to communicate around the world and it is a critical application for many businesses. Because of the fame of emails, the attackers utilize it to gather the sensitive data. ...
  • Khaing, Myo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Reducing the size of a feature set, without altering the original representation, is an essential data processing step prior to applying a learning algorithm. The removal of irrelevant and redundant information improves ...
  • Thu, Pyae Phyo; Lynn, Khin Thida (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Nyo, Nyein Nyein; Kyaw, Thae Naw Naw (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Spam is one of the main problems in e-mails communication. Naïve Bayesian (NB) learning is useful algorithm for constructing Myanmar spam corpus (SCorpus) from pre-defined spam and ham e-mails. SCorpus is built on ...
  • Hlaing, Zar Chi Su Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Ant Colony Optimization (ACO) is a useful approach for finding near optimal solutions in polynomial time for Nondeterministic Polynomial time (NP) problems. Traveling salesman problem (TSP) is a typical NP hard problem ...

Search Repository



Browse

My Account