Thirteenth International Conference On Computer Applications (ICCA 2015): Recent submissions

  • Kywe, Wyne Wyne; Murakami, Kazuhito (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Real-time system requires not only the perfect result but also the partial usable result which produces in time under time restriction. Morphological method is a tool for extracting image components that are useful in ...
  • Tun, Tar Yar Myo (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Speaker independent speech recognition is important for successful development of speech recognizer in most real world applications. This paper emphasizes speaker independent based on voice conversion usinga pitch ...
  • Khaing, Phyu Phyu; Thwe, Khine Zar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The aim of this paper is to assist Buddhists and the new Buddhist students who are unfamiliar with some of the Pali words often used in the study of Buddhism. Moreover this can also assist the students of philosophy ...
  • Myo, Zin Mar; Mon, Myat Thida (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Long Term Evolution(LTE)can support multimedia services.To guarantee the different requirements of the different services, packet scheduler plays an important role in LTE. Especially, the additional challenges are ...
  • Kyaw, Aye Aye; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    oftware testing is an activity of finding defects during execution time for a program so that nondefect software can be got. Software testing plays a vital role in developing software that is free from bugs and defects. ...
  • Wai, Myat Su; Aung, May Aye Chan (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Ontologies are set to play a vital role in the Semantic Web, e-Commerce, Bio-informatics, Artificial Intelligence, Natural Language Processing, and many other areas by providing a source of shared and precisely defined ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only end users applications ...
  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Aye, Nyein; Aung, Sandar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The system is aimed to develop the 3D model reconstruction from multi stereo images. In this paper, an efficient depth computing based on stereo matching algorithm is introduced based on feature extraction with ...
  • Aung, Nay Aung; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    There are various types of cloud services with each type having a potentially different use in criminal activity. The storage as a service (StaaS) is showing significant growth as users adopt the capability to store data ...
  • Hlaing, Yu Wai; Oo, Kyaw May (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Graphs are prevalently used to model the relationships between objects in various domains. With the increasing usage of graph data, it has become more and more demanding to efficiently process graph queries. Querying ...
  • Naing, May Thu; Thida, Aye (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Automatic summarization is the process of reducing a text document with a computer program. A summary retains the most important points of the original document. It is essential for Natural Language Processing (NLP) ...
  • Thu, Pyae Phyo; Win, Htwe Nu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The term virtual phone conversation system refers to the bidirectional Myanmar to Myanmar Speech-to-Text and Text-to-Speech translation system that runs in real-time on the mobile phones. With the used of Real-time ...
  • Win, Khine Zar Ne; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The rapid growth of aspect-oriented applications increases the need to evaluate these applications. In the past, the software attributes have been tried to subjectively and objectively evaluate for the object-oriented ...
  • Wai, Khaing Phyo; Thu, Ei Ei (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Social network analysis (SNA) is the study of social networks to understand their structure and behavior. The study of the social networks is the possibility of collecting web log data. The data used for analyzing ...
  • Lee, Junhyuk; Moon, Hichan (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In many Orthogonal Frequency Division Multiplexing (OFDM)systems, pilots are periodically transmitted for channel estimation. In this paper, we investigate a simple noise power estimation algorithm based on the time-domain ...
  • War, Nu Nu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    With the rapid growth the rich opinionated information on various features of product, people are more interested in opinion questions that can immediately reflect others’ opinions. Opinion question answering is an ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Road traffic jams continue to remain a major problem in most cities around the world, especially in developing countries.Congested roads can be avoided by estimating the real time road traffic conditions. In this paper, ...
  • Baral, Amit Raj; Koshiba, Takeshi (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Increasing dependency of data availability and the fear of losing the private information during com- munication motivate the need of privacy protection. One of the common problems occurs when two par- ties need to ...
  • San, Thinn Htet Htet; Khin, Mie Mie (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    With the incidence of severe weather and flooding on the increase around the world, there is a need to improve flood forecasting and warning. Floods cause physical damage, loss of basic sanitation that leads to disease, ...

Search Repository



Browse

My Account