UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Many system of interest in sciences can be represented as network (social network, biological network, computer science and etc), sets of nodes joined in pairs by edges. Detecting community structure is become one of the ...
  • Myint, Julia; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The need and use of scalable storage on cloud has rapidly increased in last few years. Organizations need large amount of storage for their operational data and backups. To address this need, high performance storage ...
  • Zin, Wai Wai; Soe, Than Naing (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The network security is very important for data transmission on the internet and security threat is very important challenges in any communication system. This security of information can be achieved by using encryption and ...
  • Mon, Myat Myat; Khine, May Aye (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Cloud computing is an interested and big developing computing technology that maintain data servers and service huge applications to provide end users in many different organization. Although cloud computing gives many ...
  • Kyaw, Lett Yi; Phyu, Sabai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Parallel and distributed computing is a research area that is complex and rapidly evolving. Researchers are trying to get more and more methods and technologies in parallel and distributed computing. Most users who use ...
  • Oo, Mie Khine; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Under the explosive increase of global data, the term Big data is mainly used to describe enormous datasets. With the availability of increasingly large quantities of digital information, it is becoming more difficult ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only end users applications ...
  • Yar, Kay Thi; Tun, Khin Mar Lar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for ...
  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...
  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Hlaing, Pa Pa (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Data centers have become the nextgeneration computing platforms for enterprises and Internet users. This is primarily due to the economic and technical advantages of resource sharing in data centers. By sharing ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Tun, Thant Zin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, virtualization technologies become increasingly popular in enterprise and organizational networks: such as data center. In order to facilitate fault management, highavailability, load balancing and low-level ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Latt, Win Zaw; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Education is an important part of human life and it is also valuable asset for career achievement. Nowadays, people gained certificates from the institution they had learnt and, those graduation documents are presented as ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...

Search Repository



Browse

My Account