UCSY's Research Repository

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Title

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Title

Sort by: Order: Results:

  • Aung, Hsu Mon Lei; Win, Aye Sandar; Hlaing, Swe Zin (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, it is clear that a huge data storage is needed to store very large amount of textual unstructured data. Compression is an effective technique to less data storage space. Most unstructured data are random or ...
  • Tun, Myint Thu Zar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, the government in every country needs to reduce the living standard gap between the rural and urban. Also, the government decides on the enormous amount of data regarding development facilities to become the ...
  • Aung, Thida; Sein, Myint Myint (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-17)
    Urban growth is the critical task for city planning of the developing country. It can estimate to know the increasing rate of the building area of the certain township during the specific year. The system proposes a ...
  • Thu, May Phyo; Nwe, Khine Moe; Aye, Kyar Nyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Replication is an essential corner stone for data storage not only for traditional storage systems but also for cloud environment. Data popularity is a key factor in data replication as popular files are accessed most ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • Aye, Hnin Mya; Zaw, Sai Maung Maung (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Action recognition has become an important research topic in the computer vision area. This paper presents an efficient action recognition approach based on salient object detection. Recently, many features were directly ...
  • Myint, Phyo Wah Wah; Hlaing, Swe Zin; Htoon, Ei Chaw (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Cloud computing is a rising area within the field of Information Technology (IT). It has a potential for cost savings to the enterprises but the security risk are also enormous. In cloud environment, sensitive data or ...
  • Aye, Hnin Thu Zar; Ding, Chenchen; Pa, Win Pa; Nwet, Khin Thandar; Utiyama, Masao; Sumita, Eiichiro (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this study, we investigate English-to-Myanmar statistical machine translation (SMT) by using part-of-speech (POS) as linguistic inform-ation which is valuable for statistical machine translation systems to extract ...
  • Mon, Ohnmar Min; Win, Tha Pyay; Mon, May Thida (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Software-Defined Networking (SDN) based architectures, such as Open Flow, offer a chance to design such a control plane. The SDN controller performs all complex functions, including routing and security checks. Segment ...
  • Mo, Hsu Myat; Nwet, Khin Thandar; Soe, Khin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Named Entity Recognition (NER) is the task of classifying or labeling atomic elements in the text into predefined sets of named entity categories such as Person, Location, Organization or Number. NER is also a crucial ...
  • Kyaw, May Thu; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today, mobile devices have become a widely used for personal and business purposes. Because of the popularity of mobile application, inexpensive ways for people to communicate and share information, they become the ...
  • Htwe, Khin Sabai; Aye, Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a Region of Interest (ROI) extraction method is proposed based on labeling vein images using morphological processing. Firstly, finger vein images are segmented to remove the unwanted background or the ...
  • Latt, Tin Myo; Thida, Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Morphological analysis (MA) is needed in any Natural Language Processing (NLP) Application. It means taking a word as input and identifying the stem and affix. MA provides information about a word’s semantics and the ...
  • Oo, Nan Haymarn; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Firewall provides filtering packets among network devices according to the security policy. As the firewall is an essential devices in traditional network, it is also a crucial application in the security of modern ...
  • Oo, Myat Nandar; Thein, Thandar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays Hadoop becomes a popular business paradigm for managing and storing the Big Data. It is possible for malicious users to abuse Big Data storage system and the number of illegal usages on them has increased ...
  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Lwin, Nang Khine Zar; Naing, Tin Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Distributed Database has been used as the most essential technology for business organizations in recent years. The data allocation is a critical issue in distributed database design. Allocation of data among different ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Zan, Thu Thu; Phyu, Sabai (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With advances in location based services, tracking the changing position of devices is becoming a new challenge. Mobile devices are the most effective and convenient communication tools which are not restricted by time ...

Search Repository



Browse

My Account