Fourteenth International Conference On Computer Applications (ICCA 2016): Recent submissions

  • Mon, Cho Thet; Nyo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The maintainability of any software system is quantified in terms of Maintainability Index (MI). Many research papers used MI as Maintainability indicator to validate and predict the maintainability of their proposed ...
  • War, Nu; Lwin, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electroencephalogram (EEG) signal is an important source of information for knowing brain processes. To interpret the brain activity, Matching Pursuit Based EEG signal classification is proposed. This system includes three ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Aung, Tun Myat; Oo, Myo Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, any kinds of cyber-attacks are firstly attacked to web site and the site contains information about business, government and other organizations. So, the role of web page security is becoming the essential ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Han, Ei Ei; Phyu, Thae Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Web application attack detection is one of the popular research areas during these years. SQL injection, XSS and path traversal attacks are the most commonly occurred types of web application attacks. The proposed ...
  • Kyaw, Aye Aye; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Software testing is an activity of finding defects during execution time for a program to get non-defect software. Software testing plays a vital role in developing software that is free from bugs and defects. Manual ...
  • Maung, Hsu Mon; Win, Kay Thi (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Web application testing has been used in finding various faults in order to improve the quality of reliable web services. Among test cases generation approaches, user session based testing is an approach to create test ...
  • Maw, Myint Myint; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior… It is a disciplined way to clean up code that minimizes the chances ...
  • Nyo, Khin Mar; Win, Khine Zar Ne (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In the process of developing software and fulfilling to the current trends, every modularized concern needs Extensibility, Changeability, Design Stability and Sustainability. Our study implements the software metrics ...
  • Thu, Ye Kyaw; Pa, Win Pa; Finch, Andrew; Sumita, Eiichiro; Htike, Khin War War (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper contributes the first published evaluation of the quality of string-to-tree (S2T) and tree-to-string (T2S) statistical machine translation methods between Myanmar and Chinese, English, French, German in ...
  • Thu, Ye Kyaw; Ding, Chenchen; Utiyama, Masao; Sumita, Eiichiro (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As Myanmar (Burmese) and Japanese share similar syntactic structures, we explore an approach for parsing Myanmar by using Japanese as a pivot. Specifically, we first apply a statistical machines translation (SMT) system ...
  • Phyu, Myat Sapal; Thant, Win Win; Zin, Thet Thet (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Lexicographic sorting is the task of arranging an unordered collection of words into increasing or decreasing order.The main objective of this paper is to develop Myanmar lexicographic sorting method in Myanmar traditional ...
  • Soe, Wunna; Thein, Yadana (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In this paper a grammatical-based word segmentation algorithm is presented. As the nature of Myanmar language, word segmentation process is necessary for machine translation, speech recognition, speech synthesis, etc. ...
  • Win, Yin Yin; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Myanmar is the morphologically rich and highly agglutinative language. The morphologi-cal synthesizer and analyzer are required for machine translation of English to Myanmar language. This paper the development ...
  • Nwet, Khin Thandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Efficient estimation and alignment procedures for word and phrase alignment are developed for the alignment of parallel text, and this is shown in Myanmar-English translation. Word alignment based on the combination ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The android speech recognizer acquires speech at run time through a microphone and processes the sampled speech to recognize the uttered text. But the output texts do not match with users’ data because English and ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only ends users applications ...

Search Repository



Browse

My Account