Sixteenth International Conference On Computer Applications (ICCA 2018): Recent submissions

  • Soe, Nwe Nwe; Htay, Win (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Historical handwritten palm leaf manuscripts are very informative documents from which we can learn precious and various experiences from them. This paper presents the character segmentations of historical handwriting from ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Many system of interest in sciences can be represented as network (social network, biological network, computer science and etc), sets of nodes joined in pairs by edges. Detecting community structure is become one of the ...
  • Thein, Thein; San, Kalyar Myo (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Lip reading is a process of extracting visual information, observing the movement of the lips of the speaker with or without sound. To extract visual information, reliable movements of the lips are necessary. The major ...
  • Aung, Myintzu Phyo; Aung, Ohnmar; Hlaing, Nan Yu; San, Thida; Moe, Zun Hlaing (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Parsing is breaking a sentence into its constituent nonterminal. Parsing of simple noun-phrase is useful in the study of artificial intelligence for various reasons, such as, for an index-term generation in an information ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Win, Su Su; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To ...
  • Yu, Thein; Nwet, Khin Thandar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    This paper presents a corpus of Myanmar News and its metadata, annotated with sentiment polarity. It contains 100 news from Myanmar media websites such as news-eleven.com, 7daydaily.com and popularmyanmar.com. This news ...
  • Cing, Dim Lam; Soe, Khin Mar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Word segmentation and Part-of-Speech (POS) tagging are fundamental tasks in natural language processing (NLP). The POS information is also necessary in NLP based applications such as machine translation (MT), information ...
  • Myint, Aye Aye; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Land cover/use change detection is an important component for better understanding the interactions of the human activities with the environment and necessary to simulate environmental changes. This study investigates land ...
  • Soe, Nyein Chan; Thein, Thin Lai Lai (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In recent decades, road transportation systems have become increasingly complex and congested. Traffic congestion is a serious problem that affects people both economically as well as mentally. Road traffic jam is a major ...
  • Oo, Hlaing Thida; Mya, Khin Than (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Internet of Things (IoT) is monitoring of the surrounding parameters and other several tiny devices connected together to the use of sensors that acquaint for wireless sensing of real time data and transfer them into the ...
  • Tun, Aung Naing; Zaw, Nay Win; Win, Hnin Le (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    This project proposes the Raspberry Pi with local server based image and video capturing in Electronic Toll and Traffic Management (ETTM) system for toll tax collection. Current toll collection systems in Myanmar make use ...
  • Htun, Thaung Myint; Tun, Zaw (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Supervised Machine Learning is the search for algorithms that reason from externally supplied instances to produce general hypothesis, which then make predictions about future instances. This paper describes various ...
  • Nwe, San San; Kham, Nang Saing Moon (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social media has quickly become popular as an important means that people, organizations use to spread information of divert events for various purposes, ranging from business intelligence to nation security. However, the ...
  • Aye, Nilar; Naing, Thinn Thu (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Tourism Industry is a dynamic and competitive business sector that requires updating information continuously to meet customers’ satisfaction. In addition, the industry plays a vital role for the economic growth of the ...
  • Swe, Myo Myo; Myo, Nyein Nyein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social networking sites have turned out to be extremely well known as of late. Most internet users utilize them to discover new companions, refreshes their current companions with their most recent feelings and thoughts. ...
  • Htet, Soe Yadanar Ko; Yee, Nyo Nyo (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Distributed Database Management System (DDBMS) is becoming interested due to the declining cost of computer hardware and geographically dispersed organizations where data processing is increased. A distributed database is ...
  • Win, May Thu Zar; Mya, Khin Than; Ishibashi, Yutaka (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Traditional per-flow routing increases communication complexity of both control and data planes because it requires a direct interaction between each node that is included in traffic paths and controller. Segment Routing ...
  • Su, Hla Myo; Maw, Aung Htein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Video streaming is becoming the most popular content delivery mechanism for media services. Multiple video streams will compete for bandwidth, thus leading to degrade performance and impacting the received quality of ...
  • Oo, Nan Haymarn; Maw, Aung Htein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Forwarding application is one of the most important application for sending packets in Software defined networking (SDN). It makes decision of setting flow rules for the incoming packets into switches and forwards them by ...

Search Repository



Browse

My Account