UCSY's Research Repository

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Title

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Title

Sort by: Order: Results:

  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Lwin, Nang Khine Zar; Naing, Tin Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Distributed Database has been used as the most essential technology for business organizations in recent years. The data allocation is a critical issue in distributed database design. Allocation of data among different ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Zan, Thu Thu; Phyu, Sabai (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With advances in location based services, tracking the changing position of devices is becoming a new challenge. Mobile devices are the most effective and convenient communication tools which are not restricted by time ...
  • Nyo, Hnin Lai; Hlaing, Aye Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In the era of fast information interchange, video Steganography and data hiding techniques have become essential tool for information security and secret communications. Steganography is the science of embedding secret ...
  • Zin, May Myo; Soe, Khin Mar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a comparison between neural based network that adopts Recurrent Neural Network (RNN) language model and statistical based one with N-gram language model is conducted for English-to- Myanmar phrase-based ...
  • Nwe, San San; Tun, Khin Nwe Ni (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With the proliferation of social media sites, such as Twitter, Facebook, and LinkedIn, social streams have proven to contain the most up-to-date information on current events. Therefore, it is crucial to extract activities ...
  • Khaing (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Non-Governmental organizations (NGOs) have a significant role in the development of the society because they play a vital role in the interest of general public. There are many problems faced by those NGOs regarding ...
  • Oo, Hlaing Thida; Mya, Khin Than (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Internet of Things (IoT) is being used the physical sensors into smart sensors housing interfaces and data processing. The proposed system utilizes multi sensors in order to control and also provides user the ability ...
  • Pyae, Aung; Gray, Heather; Lewis, Andrew (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Population ageing is a challenge for developing countries. Myanmar, a developing country in South-East Asia encounters the problem of a rapidly ageing population. Currently, Myanmar lacks an effective social and ...
  • Myint, Aung Zaw; Tun, Khin Mo Mo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Web-based geographic information search engines are prominently used in recent years. Spatial databases have both spatial and textual descriptions. Geographic web search engine retrieves the nearest objects that are ...
  • Zaw, Hnin Thiri; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long-lived large flows. Moreover, it can lead to low network throughput and high network ...
  • Aung, Khin Zezawar; Myo, Nyein Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Sentiment analysis is used to determine sentiments, emotions and attitude of user. In educational evaluation, sentiment analysis is implemented in teaching evaluation in order to explore the answers obtained from ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Yamada, Hiroshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The characteristics of Lithium Ion Capacitor (below , abbreviated as LIC) as a charging device is similar to Lithium Ion Battery and has quite long life, it is 100 times more than Lithium Ion Battery charge and ...
  • Thu, Ei Ei; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, the significance of automated generation of object-oriented code from design models has increased due to its benefits, such as, cost reduction and time efficiency. This paper proposed a code generator for ...
  • Wai, Khaing Phyo; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The mobile communication technologies penetrate our society and wireless network to detect the movement of people to generate large amount of data mobility including mobile phone call records and Global Positioning ...
  • San, Lwin; Cho, Ei Mon; Koshiba, Takeshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In proxy re-encryption (PRE) scheme the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. ...
  • Lwin, Wai Wai; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The World Wide Web, the largest shared information source is growing exponentially and the amount of business news on the web is overwhelming and need to be handled properly. As such, grouping the web document into ...
  • Soe, Nwe Nwe; Htay, Win (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Neural network ensemble techniques have been shown to be very accurate classification techniques. However, in some real-life applications, a number of classifiers required to achieve a reasonable accuracy is enormously ...

Search Repository



Browse

My Account