Browsing by Title

Sort by: Order: Results:

  • Aung, Su Su; Kyu, Zin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Foreground object extraction is an important subject for computer vision applications. The separation of foreground objects form the background is the crucial step in application such as video surveillance. In order ...
  • Khaing, Ei Ei (University of Computer Studies, Yangon, 2022-04-22)
    Automated Guided Vehicles have many potential applications in manufacturing, medicine, space and defense. Barrier Avoidance Robot is primary used in embedded systems. The robot is using the fuzzy logic and applied in ...
  • Myint, Phyu Hninn; Htwe, Tin Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The basic word identification is an essential process in Part-of-Speech tagging as a preprocessing step. Before disambiguating among more than one Part-of-Speech tags of one basic or root word, word boundaries need to ...
  • Hlaing, Aye Nandar; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Bayesian networks, or belief networks, show conditional probability and causality relationships between variables. Weather forecasting is important for various areas. In this paper, weather forecasting system is presented ...
  • Aung, Swe Swe; Naing, Thinn Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    As Traffic congestion is becoming an everyday facing problem in urban region, monitoring road and Traffic prediction system are playing an important role in the city life. The previous Traffic Prediction Systems were ...
  • Phyo, Zar Lwin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Grid computing can provide abundant resources to assist many studies and it can be employed in more and more projects that have so far yielded numerous findings. However, in grid environment, many distributed resources ...
  • Theint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, multi-agent system is currently popular in computer science communities. Multi-agent system consists of a number of agents which can interact with each other to reach their overall goal. In this paper, we present ...
  • Melinamath, Bhuvaneshwari C (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper explores a computational model for Kannada nouns. This is a single tool performing analysis and generation in reverse direction. Kannada has rich morphology with inflections -vibhakti, derivations and ...
  • Mung, Pau Suan; Phyu, Sabai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Healthcare industry is an ever-increasing rise in the large amount of records such as doctors, patients, medicines and medical history. Although previous medical records are beneficial for not only individual but also ...
  • Khine, Kyi Lai Lai; Nyunt, Thi Thi Soe (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Big Data Predictive Analytics is influenced in the financial market mainly in stock exchange with its emerging technologies. Stock Market Prediction has always been one of the hottest topics in research, as well as a ...
  • Khine, Kyi Lai Lai; Nyunt, Thi Thi Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The most significant climatic element which impacts on agriculture sector is rainfall and rainfall prediction becomes an important issue in agriculture country like Myanmar. Collecting, storing and processing of huge ...
  • Aye, Kyar Nyo; Thein, Ni Lar (Tenth International Conference on Computer Applications (ICCA 2012), 2012-02-28)
    In today’s world, almost every enterprise is seeing an explosion of data. They are getting huge amount of digital data generated daily. Such huge amount of data needs to be stored for various reasons. Now the important ...
  • Cho, Pyae Pyae Win; Nyunt, Thi Thi Soe (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Clustering is the task of discovering group of similar objects or items and there have been many applications for clustering such as image segmentation, document retrieval and data mining. The increasing volumes of ...
  • Jeong, Sang-Mo; Jeong, Sung-Woo; Kim, Hyung-Woo; Jeong, Yung-Kyun (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Current trend in Construction Technology is to integrate with ICT (Information & Communication Technology). BIM(Building Information Modeling) is one of the most conspicuous applications of ICT into Construction Field ...
  • Tun, Amy; Thein, Yadana (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As a potential key to defend illegal copying of digital multimedia objects, digital watermarking technology is now attracting significant awareness. With the help of a combined Lifting Wavelet Transform (LWT) and Discrete ...
  • San, Pan Ei (International Journal of Computer Science, Engineering and Applications (IJCSEA), 2014-12)
    Web pages not only contain main content, but also other elements such as navigation panels, advertisements and links to related documents. To ensure the high quality of web page, a good boilerplate removal algorithm is ...
  • Khin, Nyein Pyae Pyae; Lynn, Khin Thidar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In the clinical domain, annotated clinical records are not only expensive but also often unavailable for research due to patient privacy and confidentiality requirements. The challenge is how to train effective clinical ...
  • Mya, Khin Than; Tint, Yawai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. In this paper, techniques are presented which aim at the breaking of steganography usage in digital ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the great success of web search engines, keyword search has become the most well-liked search model for users. Information retrieval systems have popularized for searching unstructured data by keywords as a query ...
  • Thu, Su Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Since most imperative languages have similar control structures and operational logic, a pseudo programming language with clearer syntax could be more appropriate as a first teaching language. Therefore, it is an ideal ...

Search Repository

Browse

My Account