UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Yee, Tin Tin; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure. Cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of ...
  • Aung, Htain Lynn; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    E-learning is the fast and essential method of delivering educational contents. E-learning can support one of the alternative ways of quality teaching and learning as well as lifelong learning. The paper argues for the ...
  • Oo, Sheinn Thawtar; Thida, Aye (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    At the present time, machine translation is progressively more and more used to support multilingual communications. In the process of machine translation, uses of figurative language are one of the reasons that can cause ...
  • Aung, Myintzu Phyo (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In machine translation system of Myanmar to English, grammar rules are used to translate the whole input Myanmar sentences to target English sentences. These rules are based on the pattern of simple sentences in ...
  • Soe, The` The` (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A variety of Verb Phrase exists in Myanmar Language including Simple Verb Phrase, Compound Verb Phrase and so on. This paper explains the feature of Myanmar Verb Phrase and English Verb Phrase. And then, the system ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Protection of IEEE 802.11 networks means protection against attacks on confidentiality, integrity and availability. Possible threats come from vulnerabilities of security protocols. The rapid growth in the use of ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Thant, Lwin May; Phyu, Sabai (ICCA, 2021-02-25)
    In a medical problem, investigation of powerful new tools is involved in essential role of high-throughput sequencing technologies. Microarray data sequencers produced a large and complex sets of data for the advancement ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Saw, Mya Thet (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The main objective of this paper is to implement a control unit for the 16 bit CPU used in Microprocessor Trainer. In Microprocessor Trainer, there are six modules and they are connected by the address bus (A [0...15]), ...
  • Aye, Tin Moe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Since Fast Fourier Transforms are key components in many of the Digital Signal Processing applications and it is computationally intensive, a software implementation might not meet essential requirements in real time ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Aung, Zayar; Aung, Ye Thu; Sergeevich, Mihaylov Ilya; Linn, Phyo Wai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The article deals with the problem of timely forecasting and classification of problems that arise in the process of well construction remains relevant. It is necessary to create a new methodology that should help ...
  • Nyo, Khin Mar; Win, Khine Zar Ne (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In the process of developing software and fulfilling to the current trends, every modularized concern needs Extensibility, Changeability, Design Stability and Sustainability. Our study implements the software metrics ...
  • Zan, Thu Thu; Phyu, Sabai (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With advances in location based services, tracking the changing position of devices is becoming a new challenge. Mobile devices are the most effective and convenient communication tools which are not restricted by time ...
  • Hsan, Nu War; Phyu, Sabai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Web prediction is a classification approach to predict the next step of Web pages that a user may visit on the knowledge of the previously visited pages. The web usage mining techniques are used to analyze the web usage ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Ant Colony Optimization (ACO) is a metaheuristic algorithm used for combinatorial optimization problems. It is a good choice for many hard combinatorial problems because it is more efficient and produces better ...
  • Zaw, Moe Moe; Mon, Ei Ei (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Clustering is a division of data into groups of similar objects. Each group called a cluster consists of objects that are similar between themselves and dissimilar compared to objects of the other groups. Cuckoo Search ...
  • Nyo, Hnin Lai; Hlaing, Aye Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In the era of fast information interchange, video Steganography and data hiding techniques have become essential tool for information security and secret communications. Steganography is the science of embedding secret ...

Search Repository



Browse

My Account