UCSY's Research Repository

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Issue Date

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Issue Date

Sort by: Order: Results:

  • Phyu, Myat Sapal; Thant, Win Win; Zin, Thet Thet (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Lexicographic sorting is the task of arranging an unordered collection of words into increasing or decreasing order.The main objective of this paper is to develop Myanmar lexicographic sorting method in Myanmar traditional ...
  • Kyaw, Aye Aye; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Software testing is an activity of finding defects during execution time for a program to get non-defect software. Software testing plays a vital role in developing software that is free from bugs and defects. Manual ...
  • Maw, Myint Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior… It is a disciplined way to clean up code that minimizes the chances ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The android speech recognizer acquires speech at run time through a microphone and processes the sampled speech to recognize the uttered text. But the output texts do not match with users’ data because English and ...
  • Win, Ei Phyu; Aye, Nyein (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Biometrics is a method for recognizing based on physiological and behavioral characteristics. Iris recognition is one of the robust biometric technologies used for authentication applications. An iris recognition system ...
  • Lwin, Thandar; Maw, Aye Aye; Shu, Jung-Il; Kim, Jin-Wook; Lee, Jae-Woo; Kim, Sang-Ho (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This study describes multidisciplinary design framework development based on system engineering concept for various space launch vehicles to assist aeronautical engineers to successfully design mission and system ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Khine, Myat Thiri; Sein, Myint Myint; Aung, Su Nandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Geographic query is composed of query keywords and a location. Spatial keyword queries which are queries on spatial objects associated with textual attributes have received significant attention in geographic ...
  • Aye, Nilar; Naing, Thinn Thu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper proposes a framework to construct a knowledge base by using crowdsourcing approach. The various inputs have been asserted into database interactively by crowd of people via internet. The support of travel ...
  • Sein, Myint Myint; Htun, Baby (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Most of the time the destruction is performed by using the stationary objects like a timer bomb, explosives etc. A smart surveillance system can automatically detect stationary objects in public places. It has been ...
  • Nyo, Nyein Nyein; Kyaw, Thae Naw Naw (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Spam is one of the main problems in e-mails communication. Naïve Bayesian (NB) learning is useful algorithm for constructing Myanmar spam corpus (SCorpus) from pre-defined spam and ham e-mails. SCorpus is built on ...
  • Han, Ei Ei; Phyu, Thae Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Web application attack detection is one of the popular research areas during these years. SQL injection, XSS and path traversal attacks are the most commonly occurred types of web application attacks. The proposed ...
  • Shin, Han Sol; Yu, Taejun; Lee, Kun (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Plasma based particle accelerator has mainly used in nuclear field only because of the large scale of the facility. However, since laser-plasma particle accelerator which has smaller size and spends less cost. ...
  • Thu, Pyae Phyo; Lynn, Khin Thida (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Nwet, Khin Thandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Efficient estimation and alignment procedures for word and phrase alignment are developed for the alignment of parallel text, and this is shown in Myanmar-English translation. Word alignment based on the combination ...
  • Chaw, Hnin Thiri; Thuzar, Myat; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In recent year, the transportation networks are becoming more and more complex and navigation services are increasingly necessary for the people living in the modern society. One of the requirements in the cities of ...
  • Zan, Thu Thu; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural disaster cannot be prevented, but its impacts can be eliminated or reduced. Mobile devices are the most effective and convenient communication tools which are not restricted by time and place. In this paper, ...
  • Aye, Nilar; San, Pan Ei (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The web content classification system classifies the noise or content from HTML web pages. The system proposes the Content Extraction algorithm using content features to remove the boilerplate and to extract the main ...
  • Mon, Cho Thet; Nyo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The maintainability of any software system is quantified in terms of Maintainability Index (MI). Many research papers used MI as Maintainability indicator to validate and predict the maintainability of their proposed ...
  • Aung, Tun Myat; Oo, Myo Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, any kinds of cyber-attacks are firstly attacked to web site and the site contains information about business, government and other organizations. So, the role of web page security is becoming the essential ...

Search Repository



Browse

My Account