Thirteenth International Conference On Computer Applications (ICCA 2015): Recent submissions

  • Thein, Khin Me Me; Nyunt, Thi Thi Soe (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Apache Kafka is publish-subscribe messaging implemented as a distributed commit log, suitable for both offline and online message consumption. It is a messaging system initially developed at LinkedIn for collecting and ...
  • Maung, Hsu Mon; Win, Kay Thi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Nowadays, web application is crucial for most daily activities that rely on the web services. To improve the quality of reliable web services, web application testing has been used in finding faults under test. User ...
  • Htun, Baby; Sein, Myint Myint (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Object motion and human motion tracking is an important technique used in many systems, especially in the fields of computer vision. An automatic motion tracking and catching system is developed in this research. It ...
  • Myint, Theint Zarni (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Speech recognition reduces the overhead caused by alternate communication methods. Speech has not been used much in the field of electronics and computers due to the complexity and variety of speech signals and sounds. ...
  • Yu, Tin Tin; San, Tin Tin (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    As the size of the World Wide Web increase and search engines play an important part for the retrieving information. Search Engines provide the gateway for users trying to explore information from web pages. The purpose ...
  • Aye, Hnin Mya; Win, Si Si Mar; Soe, Thin Thin (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Cloud computing is a distributed computing paradigm in which computing resources, software, applications, information, and infrastructures are dynamically offered as services over the internet. Since distributed services ...
  • Win, Lai Lai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Web search has become amazingly powerful in its ability to discover and exploit nearly any kind of information that comprises the web. However, as powerful and large as current web search engine are , stilled limited ...
  • Linn, Khaing Wah Wah; Phyu, Sabai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Nowadays, a large number of web pages contained useful information is often accompanied by a large amount of noise such as banner advertisements, navigation bars, copyright notices, etc. These noise data can seriously ...
  • Win, May Thu; Win, Kay Thi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    A fundamental problem in image processing is image segmentation. The conventional image segmentation methods, to some extent, all suffer from the problem of inaccurate segmentation. A slightly easier and more approachable ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Thu, Pyae Phyo; Lynn, Khin Thidar (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Thwe, Khine Zar; Khaing, Phyu Phyu (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Cloud computing is a term to deliver software, storage and processing. It increases system’s capability without changing the existing infrastructure, educating new people or taking license for the software. It improves ...
  • Myint, May Thu (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    The large quantities of information in both audio and video is a great need for efficient ways of searching and retrieving relevant information. The goal of an audio indexing is to provide the capability of searching ...
  • Mon, Khin Lay; Thaw, Mie Mie (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Fully automatic image segmentation is a difficult task for natural images because of many variations ascontrast and complex background. Conventional segmentation methods require a considerable amount of interactive ...
  • Lwin, Zin Mar; Thaw, Mie Mie (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Brain Computer Interface (BCI) Systems have developed for new way of communication between computer and human who are suffer from severe motor disabilities and difficult to communicate with their environment. BCI let ...
  • Wai, Khaing Phyo; Aung, Yi Yi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Web log data or click stream data has a lot of valuable information about a web site or web site visitors’ online behavior. Web usage analysis or web log mining is the process of capturing, analyzing and modeling the ...
  • Lynn, Nay Chi; Aung, Su Su (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Making use of search engines is most popular Internet task apart from email. Currently, all major search engines employ web crawlers because effective web crawling is a key to the success of modern search engines. Web ...
  • Win, Si Si Mar; Aye, Hnin Mya (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Mobile Cloud Computing(MCC)provides a platform where mobile users make use of cloud services on mobile devices. The use of mobile clouds in educational settings can provide great opportunities for students as well as ...
  • Win, Zin Mar; Aye, Nyein (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    The explosion of Image spam emails has prompted the development of numerous spam filtering techniques. This paper proposes an efficient image spam filtering system using three methods. The first method, File ...
  • Sung, Hong Gye; Jeong, Won Cheol; Kim, Sung Yoon (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    To analyze the emissions of a turbulent lean premixed Methane-air combustor, a level set Gequation method has been implemented in the Large Eddy Simulation (LES) framework using parallel personal server. The server ...

Search Repository



Browse

My Account