UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Lin, Kyaw Soe; Thwin, Mie Mie Su; Maw, Htoo Aung (ICCA, 2021-02-25)
    Attaining a mortgage can be very painful, costly and lengthy process especially when the policy and infrastructure is not easy to implement it. In Myanmar, the process of the origination for mortgage can be minimum 30 days ...
  • Lwin, Tun; Lee, Jae Woo; Kim, Sangho; Byun, Yung Hwan; Nguyen, Nhu Van (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Database Management Systems (DBMS) and Databases Designs are main subject in large business system and engineering framework. In this paper, Aircraft Design and Certification Framework (ADF) and database are ...
  • Shwe, Hnin Yu; Chong, Peter Han Joo (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Now a day, wireless sensor networks play a key role in smart building systems by providing the “real time” information to the system. In resource constrained wireless sensor networks, it is veryimportant to design the ...
  • Aung, Nyein Thwet Thwet; Soe, Khin Mar; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Word Sense Disambiguation (WSD) has always been a key problem in Natural Language Processing. WSD is defined as the task of finding the correct sense of a word in a specific context. There is not any cited work for ...
  • Paing, Aye Myat Myat (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Deficiency of flexibility and programmability of legacy network architecture has been the concern of many networking admirers for some years. Software defined networking (SDN) is a new emerging concept to logically ...
  • Oo, Khine Zar; Tun, Ei Ei Moe (ICCA, 2021-02-25)
    Since 2012, internet usage in the world has grown from a mere 1.8% to 59% in 2020. The numbers of online shopping webs in the world are becoming greater than ever before. People use the internet to access or update reviews. ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Mon, Tin Lai Lai; Thein, Thin Lai Lai (ICCA, 2021-02-25)
    Interpolation of GPS points is one of the biggest challenges in the world of today. GPS signals may be lost because of many reasons including signal loss and battery loss of the transceiver. Our research work is intended ...
  • Linn, Khaing Wah Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As the use of web is increasing more day by day, the World Wide Web is rapidly growing on all aspects. It is the duty of service provider to provide relevant information to the internet user against their query submitted ...
  • TSUBAKI, Hajime; OGAMI, Takeru; KONDO, Mariko; SAGISAKA, Yoshinori (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Aiming at objective evaluation of L2 (second language) learners' proficiency, we statistically analyzed mispronunciation characteristics of Japanese learners' English speech based on phonetic knowledge. Through automatic ...
  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In client-server type, due to repeated and potentially faulty usage of long running server is requested by many clients, such software "ages" with time and eventually fails. We show that virtualization promotes a new ...
  • Lwin, Zin Mar; Thaw, Mie Mie (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Brain Computer Interface (BCI) Systems have developed for new way of communication between computer and human who are suffer from severe motor disabilities and difficult to communicate with their environment. BCI let ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Win, Myat Su; Khin, Thet Thet (ICCA, 2021-02-25)
    Essential role of Internet-based communication is the security of information. Classical Cryptography is based on mathematical models and computational complexity to compute the secret key. It does not provide enough ...
  • Aung, Yi Yi; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...

Search Repository



Browse

My Account