UCSY's Research Repository

Browsing Thirteenth International Conference On Computer Applications (ICCA 2015) by Title

Browsing Thirteenth International Conference On Computer Applications (ICCA 2015) by Title

Sort by: Order: Results:

  • Lee, Jihoon; Jung, Kyung-Tae; Moon, Hichan (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In this paper, a power efficient wireless system ispresented for a large scale Ad-hoc network. In the proposedsystem, a whole Ad-hoc network is composed of one or morelocally time-synchronized subgroups. All communication ...
  • Mon, Cho Thet; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Software quality metric for PHP is scarce in literature. This paper presents a technical and research overview of software quality assessment especially for software complexity to establish a software quality observatory ...
  • Thinzar, Cho; Aye, Nyein (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    In the field of natural disaster management, storm detection, forecasting the weather condition and change detection are occupied as essential role. The storm direction detection is provided to manage and to prevent ...
  • Thinzar, Cho; Aye, Nyein (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In the field of natural disaster management, storm detection, forecasting the weather condition and change detection are occupied as essential role. The storm direction detection is provided to manage and to prevent ...
  • Khaing, Phyu Phyu; Thwe, Khine Zar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The aim of this paper is to assist Buddhists and the new Buddhist students who are unfamiliar with some of the Pali words often used in the study of Buddhism. Moreover this can also assist the students of philosophy ...
  • Kyaw, Aye Aye; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    oftware testing is an activity of finding defects during execution time for a program so that nondefect software can be got. Software testing plays a vital role in developing software that is free from bugs and defects. ...
  • Thu, Pyae Phyo; Win, Htwe Nu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The term virtual phone conversation system refers to the bidirectional Myanmar to Myanmar Speech-to-Text and Text-to-Speech translation system that runs in real-time on the mobile phones. With the used of Real-time ...
  • Zar, Myat Thu; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Building public route transportation system is the key technology for urban areas. Most of citizens in Yangon area make use of public transportation such as bus, taxi, rail and so on. In this system, A* algorithm is used ...
  • Aung, Win Win (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In client server communication, the client is completely dependent on the server for computation logic; while, the application logic is performing for the client. The latency measurement is important and this paper ...
  • Win, Tin Nilar; Htoo, Htoo; Ohsawa, Yutaka (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper proposed a reverse k nearest neighbor (RkNN) query algorithm in road network distance by using the simple materialization path view (SMPV) data structure.When a set of interest objects P and a query point q ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only end users applications ...
  • Yar, Kay Thi; Tun, Khin Mar Lar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for ...
  • Kyaw, Ei Mon; Khin, Myat Thanda (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Speech Recognition is a technology that can be useful in many applicationof our daily life. This proposed method present the speaker dependent speech recognition system. In this paperinclude the three steps of speech ...
  • Thet, Yi Mon; Nyunt, Thi Thi Soe; Yuzana (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Since XML (eXtensible Markup) is the popular language for the data over the Internet, querying XML data is interested topic in research area. In order to efficiently process the XML query, indexing schemes are vital ...
  • Aye, Hnin Mya; Win, Si Si Mar; Soe, Thin Thin (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Cloud computing is a distributed computing paradigm in which computing resources, software, applications, information, and infrastructures are dynamically offered as services over the internet. Since distributed services ...
  • Wai, Myat Su; Aung, May Aye Chan (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Ontologies are set to play a vital role in the Semantic Web, e-Commerce, Bio-informatics, Artificial Intelligence, Natural Language Processing, and many other areas by providing a source of shared and precisely defined ...
  • Yu, Tin Tin; San, Tin Tin (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    As the size of the World Wide Web increase and search engines play an important part for the retrieving information. Search Engines provide the gateway for users trying to explore information from web pages. The purpose ...
  • Aung, May Aye Chan; Wai, Myat Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Data security is the challenging issue in todays world that touches many areas using computer communication. Recent cyber security attacks have certainly played with the sentiments of the users [9]. Encryption is one ...
  • Lynn, Nay Chi; Aung, Su Su (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Making use of search engines is most popular Internet task apart from email. Currently, all major search engines employ web crawlers because effective web crawling is a key to the success of modern search engines. Web ...
  • Aung, Yi Yi; Thu, Ei Ei (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The World Wide Web (WWW) is a rich source of information and continues to expand in size. The complexity at the WWW makes it difficult for data mining. Before the Web, finding information meant asking a friend or an ...

Search Repository



Browse

My Account