UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Shwe, Lae Lae; Theint, Khant Kyawt Kyawt; Sein, Myint Myint; Thein, Thin Lai Lai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    3-D reconstruction of buildings in urban areas is one of the highlighted issues in photogrammetry, remote sensing, computer vision, and computer graphic. It can be used in various fields such as urban planning, construction, ...
  • Theint, Khant Kyawt Kyawt; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The system is aimed to develop the 3D building model of urban area with low resolution satellite images from Google earth that provides to create the three dimensional geographic information systems (GIS). In this ...
  • Aye, Zin Win (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents adaptive Medical Image Compression using adaptive Huffman encoding technique for mobile devices to reduce the transmission energy of images through wireless networks. With an increase in the usage of ...
  • Than, Yu Yu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Richer types of multimedia such as audio, video and 3D objects are becoming more and more common place. However, current retrieval techniques in these areas are not as sophisticated as textual and 2D image techniques ...
  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Lwin, Tun; Lee, Jae Woo; Kim, Sangho; Byun, Yung Hwan; Nguyen, Nhu Van (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Database Management Systems (DBMS) and Databases Designs are main subject in large business system and engineering framework. In this paper, Aircraft Design and Certification Framework (ADF) and database are ...
  • Shwe, Hnin Yu; Chong, Peter Han Joo (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Now a day, wireless sensor networks play a key role in smart building systems by providing the “real time” information to the system. In resource constrained wireless sensor networks, it is veryimportant to design the ...
  • Aung, Nyein Thwet Thwet; Soe, Khin Mar; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Word Sense Disambiguation (WSD) has always been a key problem in Natural Language Processing. WSD is defined as the task of finding the correct sense of a word in a specific context. There is not any cited work for ...
  • Paing, Aye Myat Myat (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Deficiency of flexibility and programmability of legacy network architecture has been the concern of many networking admirers for some years. Software defined networking (SDN) is a new emerging concept to logically ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Linn, Khaing Wah Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As the use of web is increasing more day by day, the World Wide Web is rapidly growing on all aspects. It is the duty of service provider to provide relevant information to the internet user against their query submitted ...
  • TSUBAKI, Hajime; OGAMI, Takeru; KONDO, Mariko; SAGISAKA, Yoshinori (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Aiming at objective evaluation of L2 (second language) learners' proficiency, we statistically analyzed mispronunciation characteristics of Japanese learners' English speech based on phonetic knowledge. Through automatic ...
  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In client-server type, due to repeated and potentially faulty usage of long running server is requested by many clients, such software "ages" with time and eventually fails. We show that virtualization promotes a new ...
  • Lwin, Zin Mar; Thaw, Mie Mie (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Brain Computer Interface (BCI) Systems have developed for new way of communication between computer and human who are suffer from severe motor disabilities and difficult to communicate with their environment. BCI let ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Aung, Yi Yi; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...

Search Repository



Browse

My Account