UCSY's Research Repository

Fifteenth International Conference On Computer Applications (ICCA 2017)

Fifteenth International Conference On Computer Applications (ICCA 2017)

 

Recent Submissions

  • Thu, Ye Kyaw; Takabuchi, Kenta; Fukai, Kaisei; Iwahashi, Naoto; Kunishima, Takeo (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-16)
    Language acquisition for robot is a challenging topic in the artificial intelligence research area and essential for natural communication between robot and human. In this paper, we proposed language acquisition ...
  • Kyaw, Win Thuzar; SAGISAKA, Yoshinori (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-16)
    Following the successful findings of high correlations between speech and color such as F0 and Value, Loudness and Saturation and Spectrum and Hue, we analyzed the correlations between voice source characteristics and ...
  • Mon, Aye Nyein; Pa, Win Pa; Thu, Ye Kyaw (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-16)
    Myanmar language is a tonal and analytic language. It can be considered as an under-resourced language because of its linguistic resource availability. Therefore, speech data collection is a very challenging task in ...
  • Nyein, May Kyi; Soe, Khin Mar (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-16)
    Word reordering is a problematic issue for language pairs with significantly different word orders, such as the translation between a subject-verb-object (SVO) language and a subject-object-verb (SOV) language. When ...
  • Zin, May Myo; Soe, Khin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a comparison between neural based network that adopts Recurrent Neural Network (RNN) language model and statistical based one with N-gram language model is conducted for English-to- Myanmar phrase-based ...
  • Mo, Hsu Myat; Nwet, Khin Thandar; Soe, Khin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Named Entity Recognition (NER) is the task of classifying or labeling atomic elements in the text into predefined sets of named entity categories such as Person, Location, Organization or Number. NER is also a crucial ...
  • Latt, Tin Myo; Thida, Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Morphological analysis (MA) is needed in any Natural Language Processing (NLP) Application. It means taking a word as input and identifying the stem and affix. MA provides information about a word’s semantics and the ...
  • Fam, Rashel; Lepage, Yves; Gojali, Susanti; Purwarianti, Ayu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Abstract We propose a pipeline to explain, on the level of form, the unseen words contained in an Indonesian test set, by using analogical clusters. Analogical clusters are extracted from a training set by relying on ...
  • Aye, Hnin Thu Zar; Ding, Chenchen; Pa, Win Pa; Nwet, Khin Thandar; Utiyama, Masao; Sumita, Eiichiro (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this study, we investigate English-to-Myanmar statistical machine translation (SMT) by using part-of-speech (POS) as linguistic inform-ation which is valuable for statistical machine translation systems to extract ...
  • Nwet, Khin Thandar; Khine, Aye Hnin; Soe, Khin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Text classification is one of the major tasks of natural language processing and included in the interesting research areas of text data mining, which is about looking for patterns in natural language text. This ...
  • Oo, Nan Haymarn; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Firewall provides filtering packets among network devices according to the security policy. As the firewall is an essential devices in traditional network, it is also a crucial application in the security of modern ...
  • Win, May Thu Zar; Maw, Aung Htein; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Segment Routing (SR) is an emerging technology to enforce the effective routing strategies without relying on signaling protocols. SR only needs to define the path information through the network at the ingress device ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Zaw, Hnin Thiri; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long-lived large flows. Moreover, it can lead to low network throughput and high network ...
  • Mon, Ohnmar Min; Win, Tha Pyay; Mon, May Thida (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Software-Defined Networking (SDN) based architectures, such as Open Flow, offer a chance to design such a control plane. The SDN controller performs all complex functions, including routing and security checks. Segment ...
  • Win, Nay Aung Soe; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Big data in terms is the huge volume of data that is difficult to be processed, handled and managed. The term big data is an emerging trend where a number of researches and data scientists are carried out for data ...
  • Nyo, Hnin Lai; Hlaing, Aye Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In the era of fast information interchange, video Steganography and data hiding techniques have become essential tool for information security and secret communications. Steganography is the science of embedding secret ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...

View more