UCSY's Research Repository

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Title

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Title

Sort by: Order: Results:

  • Kyaw, May Thu; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today, mobile devices have become a widely used for personal and business purposes. Because of the popularity of mobile application, inexpensive ways for people to communicate and share information, they become the ...
  • Htwe, Khin Sabai; Aye, Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a Region of Interest (ROI) extraction method is proposed based on labeling vein images using morphological processing. Firstly, finger vein images are segmented to remove the unwanted background or the ...
  • Latt, Tin Myo; Thida, Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Morphological analysis (MA) is needed in any Natural Language Processing (NLP) Application. It means taking a word as input and identifying the stem and affix. MA provides information about a word’s semantics and the ...
  • Oo, Nan Haymarn; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Firewall provides filtering packets among network devices according to the security policy. As the firewall is an essential devices in traditional network, it is also a crucial application in the security of modern ...
  • Oo, Myat Nandar; Thein, Thandar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays Hadoop becomes a popular business paradigm for managing and storing the Big Data. It is possible for malicious users to abuse Big Data storage system and the number of illegal usages on them has increased ...
  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Lwin, Nang Khine Zar; Naing, Tin Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Distributed Database has been used as the most essential technology for business organizations in recent years. The data allocation is a critical issue in distributed database design. Allocation of data among different ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Zan, Thu Thu; Phyu, Sabai (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With advances in location based services, tracking the changing position of devices is becoming a new challenge. Mobile devices are the most effective and convenient communication tools which are not restricted by time ...
  • Nyo, Hnin Lai; Hlaing, Aye Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In the era of fast information interchange, video Steganography and data hiding techniques have become essential tool for information security and secret communications. Steganography is the science of embedding secret ...
  • Zin, May Myo; Soe, Khin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a comparison between neural based network that adopts Recurrent Neural Network (RNN) language model and statistical based one with N-gram language model is conducted for English-to- Myanmar phrase-based ...
  • Nwe, San San; Tun, Khin Nwe Ni (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With the proliferation of social media sites, such as Twitter, Facebook, and LinkedIn, social streams have proven to contain the most up-to-date information on current events. Therefore, it is crucial to extract activities ...
  • Khaing (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Non-Governmental organizations (NGOs) have a significant role in the development of the society because they play a vital role in the interest of general public. There are many problems faced by those NGOs regarding ...
  • Oo, Hlaing Thida; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Internet of Things (IoT) is being used the physical sensors into smart sensors housing interfaces and data processing. The proposed system utilizes multi sensors in order to control and also provides user the ability ...
  • Pyae, Aung; Gray, Heather; Lewis, Andrew (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Population ageing is a challenge for developing countries. Myanmar, a developing country in South-East Asia encounters the problem of a rapidly ageing population. Currently, Myanmar lacks an effective social and ...
  • Myint, Aung Zaw; Tun, Khin Mo Mo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Web-based geographic information search engines are prominently used in recent years. Spatial databases have both spatial and textual descriptions. Geographic web search engine retrieves the nearest objects that are ...
  • Zaw, Hnin Thiri; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long-lived large flows. Moreover, it can lead to low network throughput and high network ...
  • Aung, Khin Zezawar; Myo, Nyein Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Sentiment analysis is used to determine sentiments, emotions and attitude of user. In educational evaluation, sentiment analysis is implemented in teaching evaluation in order to explore the answers obtained from ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Yamada, Hiroshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The characteristics of Lithium Ion Capacitor (below , abbreviated as LIC) as a charging device is similar to Lithium Ion Battery and has quite long life, it is 100 times more than Lithium Ion Battery charge and ...

Search Repository



Browse

My Account