Fifteenth International Conference On Computer Applications (ICCA 2017): Recent submissions

  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • San, Lwin; Cho, Ei Mon; Koshiba, Takeshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In proxy re-encryption (PRE) scheme the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. ...
  • Aung, Su Su; Kyu, Zin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Foreground object extraction is an important subject for computer vision applications. The separation of foreground objects form the background is the crucial step in application such as video surveillance. In order ...
  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Htwe, Khin Sabai; Aye, Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a Region of Interest (ROI) extraction method is proposed based on labeling vein images using morphological processing. Firstly, finger vein images are segmented to remove the unwanted background or the ...
  • Tun, Zar Zar; Nwe, Khin Htar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everything that can be watched on a screen uses video coding which tends to reduce the amount of redundant video data in video compression. The idea behind video compression based on motion estimation is to save number ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Soe, Nwe Nwe; Htay, Win (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Neural network ensemble techniques have been shown to be very accurate classification techniques. However, in some real-life applications, a number of classifiers required to achieve a reasonable accuracy is enormously ...
  • Aye, Hnin Mya; Zaw, Sai Maung Maung (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Action recognition has become an important research topic in the computer vision area. This paper presents an efficient action recognition approach based on salient object detection. Recently, many features were directly ...
  • Aung, Su Wit Yi; Khaing, Soe Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Land use and land cover change has become a vital component in current strategies for managing natural resources and monitoring environmental changes. Analyzing the changing of hydrological area, vegetation area and ...
  • Hlaing, Wai Mar; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Smartphones and ubiquitous devices are more and more popular and used for map based services in nowadays. Map based Services are especially used for transportation systems. In this system, optimal path will be recommended ...
  • Myint, Aung Zaw; Tun, Khin Mo Mo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Web-based geographic information search engines are prominently used in recent years. Spatial databases have both spatial and textual descriptions. Geographic web search engine retrieves the nearest objects that are ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Khaing, Phyu Phyu; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Real time monitoring of twitter tweet streams for trends has popularity in the last decade. This provide effective information for government, business and other organization to know what happening right now. The task ...
  • Thu, Ei Ei; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, the significance of automated generation of object-oriented code from design models has increased due to its benefits, such as, cost reduction and time efficiency. This paper proposed a code generator for ...
  • Khaing (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Non-Governmental organizations (NGOs) have a significant role in the development of the society because they play a vital role in the interest of general public. There are many problems faced by those NGOs regarding ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Tun, Myint Thu Zar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, the government in every country needs to reduce the living standard gap between the rural and urban. Also, the government decides on the enormous amount of data regarding development facilities to become the ...
  • Pyae, Aung; Gray, Heather; Lewis, Andrew (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Population ageing is a challenge for developing countries. Myanmar, a developing country in South-East Asia encounters the problem of a rapidly ageing population. Currently, Myanmar lacks an effective social and ...

Search Repository



Browse

My Account