UCSY's Research Repository

Browsing Thirteenth International Conference On Computer Applications (ICCA 2015) by Title

Browsing Thirteenth International Conference On Computer Applications (ICCA 2015) by Title

Sort by: Order: Results:

  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Win, Khine Zar Ne; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The rapid growth of aspect-oriented applications increases the need to evaluate these applications. In the past, the software attributes have been tried to subjectively and objectively evaluate for the object-oriented ...
  • Aung, Su Nandar; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Spatial keyword search on spatial database has been well studied for years due to its importance to commercial search engines.Specially, a spatial keyword query takes a user location and user-supplied keywords as ...
  • Thu, Pyae Phyo; Lynn, Khin Thidar (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Road traffic jams continue to remain a major problem in most cities around the world, especially in developing countries.Congested roads can be avoided by estimating the real time road traffic conditions. In this paper, ...
  • Win, Zin Mar; Aye, Nyein (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    The explosion of Image spam emails has prompted the development of numerous spam filtering techniques. This paper proposes an efficient image spam filtering system using three methods. The first method, File ...
  • Thein, Khant Kyaw Kyawt; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper handles a robust method to handle matching problem of the 3D building from remote sensed images, where two or more images are captured from the different views without any camera information. The system is ...
  • War, Nu Nu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    With the rapid growth the rich opinionated information on various features of product, people are more interested in opinion questions that can immediately reflect others’ opinions. Opinion question answering is an ...
  • Hlaing, Yu Wai; Oo, Kyaw May (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Graphs are prevalently used to model the relationships between objects in various domains. With the increasing usage of graph data, it has become more and more demanding to efficiently process graph queries. Querying ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Hsan, Nu War; Phyu, Sabai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Web prediction is a classification approach to predict the next step of Web pages that a user may visit on the knowledge of the previously visited pages. The web usage mining techniques are used to analyze the web usage ...
  • Nyaung, Dim En; Thein, Thin Lai Lai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated ...
  • Win, Ngu Wah (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The growth of big data is a result of the variety of data through user generated data from many devices. Today, big data analytics, extracting data knowledge from large datasets, is shifted from personal desktop computer ...
  • Win, Si Si Mar; Aye, Hnin Mya (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Mobile Cloud Computing(MCC)provides a platform where mobile users make use of cloud services on mobile devices. The use of mobile clouds in educational settings can provide great opportunities for students as well as ...
  • Kyaw, Thae Naw Naw; Myo, Nyein Nyein (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Internet has become rich of information. This information should be properly managed. Electronic mail (E-mail) has become a major problem for internet users and providers. People are using e-mail services but most of ...
  • Win, Yin Yin; Nwe, Tin Htar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper presents the development of bidirectional machine translation system of Myanmar- English. This Machine Translation system is based on Transfer Based Approach. It contains three stages: (1) source sentence ...
  • Win, May Thu; Win, Kay Thi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    A fundamental problem in image processing is image segmentation. The conventional image segmentation methods, to some extent, all suffer from the problem of inaccurate segmentation. A slightly easier and more approachable ...
  • Kywe, Wyne Wyne; Murakami, Kazuhito (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Real-time system requires not only the perfect result but also the partial usable result which produces in time under time restriction. Morphological method is a tool for extracting image components that are useful in ...
  • Linn, Khaing Wah Wah; Phyu, Sabai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Nowadays, a large number of web pages contained useful information is often accompanied by a large amount of noise such as banner advertisements, navigation bars, copyright notices, etc. These noise data can seriously ...
  • Sung, Hong Gye; Jeong, Won Cheol; Kim, Sung Yoon (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    To analyze the emissions of a turbulent lean premixed Methane-air combustor, a level set Gequation method has been implemented in the Large Eddy Simulation (LES) framework using parallel personal server. The server ...

Search Repository



Browse

My Account