UCSY's Research Repository

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Browsing Fourteenth International Conference On Computer Applications (ICCA 2016) by Title

Sort by: Order: Results:

  • Shwe, Lae Lae; Theint, Khant Kyawt Kyawt; Sein, Myint Myint; Thein, Thin Lai Lai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    3-D reconstruction of buildings in urban areas is one of the highlighted issues in photogrammetry, remote sensing, computer vision, and computer graphic. It can be used in various fields such as urban planning, construction, ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The android speech recognizer acquires speech at run time through a microphone and processes the sampled speech to recognize the uttered text. But the output texts do not match with users’ data because English and ...
  • Hsan, Nu War; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Due to uncontrolled exponential growth in web data, knowledge based retrieval has become a challenging task. The one viable solution to the problem is the merging of conventional web mining with semantic technologies. There ...
  • Khine, Kyi Lai Lai; Nyunt, Thi Thi Soe (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Big Data Predictive Analytics is influenced in the financial market mainly in stock exchange with its emerging technologies. Stock Market Prediction has always been one of the hottest topics in research, as well as a ...
  • Aung, Thida; Moe, Khaing Cho; Sein, Myint Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is exposed to a number of natural hazards, some of which have caused devastating damage in the recent past. According to the UN Risk Model, Myanmar ranks as the ‘most at risk’ country for natural disasters. ...
  • Han, Ei Ei; Phyu, Thae Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Web application attack detection is one of the popular research areas during these years. SQL injection, XSS and path traversal attacks are the most commonly occurred types of web application attacks. The proposed ...
  • Kyaw, Theingi; Htun, Zaw (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile phone based activity recognition uses data obtained from embedded sensors to infer user’s physical activities. Therefore, many mobile phones have been equipped with sensors to enable the delivery of advanced ...
  • Sein, Myint Myint; Htun, Baby (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Most of the time the destruction is performed by using the stationary objects like a timer bomb, explosives etc. A smart surveillance system can automatically detect stationary objects in public places. It has been ...
  • Yu, Thanda Tin (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Social network analysis has undergone a renaissance with the ubiquity and quantity of content from social media, web pages, and sensors. This content is a rich data source for constructing and analyzing social networks. ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Mon, Cho Thet; Nyo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The maintainability of any software system is quantified in terms of Maintainability Index (MI). Many research papers used MI as Maintainability indicator to validate and predict the maintainability of their proposed ...
  • Zaw, San Kyaw; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The evolution of web has positively transformed the paradigm of communication, trading, and collaboration for the benefit of humanity. However, these benefits of the Web are shadowed by cyber-criminals who use the Web ...
  • Aung, Tun Myat; Oo, Myo Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, any kinds of cyber-attacks are firstly attacked to web site and the site contains information about business, government and other organizations. So, the role of web page security is becoming the essential ...
  • Win, Ngu Wah (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Big data analytics are the significant solution of business decisions of many organizations by examining large data sets. On the other hand, mobile devices are playing an increasingly important role in the future of ...
  • Nwet, Khin Thandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Efficient estimation and alignment procedures for word and phrase alignment are developed for the alignment of parallel text, and this is shown in Myanmar-English translation. Word alignment based on the combination ...
  • Lwin, Thandar; Maw, Aye Aye; Shu, Jung-Il; Kim, Jin-Wook; Lee, Jae-Woo; Kim, Sang-Ho (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This study describes multidisciplinary design framework development based on system engineering concept for various space launch vehicles to assist aeronautical engineers to successfully design mission and system ...
  • Nakajima, Shigeyoshi; Ikebuchi, Mitsuhiko (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A gait is one of indicators of health. We reported that the ratio of the step power per the stride power in Fourier transform harmonics of a gait shows a recovery from a damage of total hip replacement operation several ...
  • Win, May Thu; Win, Kay Thi (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Interactive image segmentation has many applications in image processing, computer vision, computer graphics and medical image analysis. In medical applications, image segmentation is a fundamental process in most systems ...
  • Lwin, Nyein Nyein; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The design of real-time embedded systems involves a constant trade-off between meeting real-time design goals and operating within power and energy budgets. Nowadays, embedded systems are commonly applied in automotive ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As the internet evolves and computer networks become bigger and bigger, network security is one of the most challenging issues in today's world that touches many areas using network communication. Nowadays, there is a ...

Search Repository



Browse

My Account