UCSY's Research Repository

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Issue Date

Browsing Fifteenth International Conference On Computer Applications (ICCA 2017) by Issue Date

Sort by: Order: Results:

  • Khine, Kyi Lai Lai; Nyunt, Thi Thi Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The most significant climatic element which impacts on agriculture sector is rainfall and rainfall prediction becomes an important issue in agriculture country like Myanmar. Collecting, storing and processing of huge ...
  • Aung, Su Wit Yi; Khaing, Soe Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Land use and land cover change has become a vital component in current strategies for managing natural resources and monitoring environmental changes. Analyzing the changing of hydrological area, vegetation area and ...
  • Shin, Han Sol; Song, Jee Ho; Yu, Tae Jun; Lee, Kun (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Particle accelerator has mainly used in nuclear field only because of the large scale of facility. However, since laser-plasma particle accelerator, which has smaller size and spends less cost, developed, the availability ...
  • Lewis, A.; Randall, M.; Capon, S.; Jackwitz, E. (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Increasing human populations and the impact of climate changes has meant that food security is increasingly an important issue. One of the main factors is the availability of water for agricultural purposes. Recently, ...
  • Aung, Khin Zezawar; Myo, Nyein Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Sentiment analysis is used to determine sentiments, emotions and attitude of user. In educational evaluation, sentiment analysis is implemented in teaching evaluation in order to explore the answers obtained from ...
  • Thu, May Phyo; Nwe, Khine Moe; Aye, Kyar Nyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Replication is an essential corner stone for data storage not only for traditional storage systems but also for cloud environment. Data popularity is a key factor in data replication as popular files are accessed most ...
  • Soe, Yan Naung; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Mobile devices have gained tremendous popularity over the last few years. The most popular usage is the smart phones. They are accepted and admired by many mainly because they are capable of providing services such as ...
  • Aye, Hnin Mya; Zaw, Sai Maung Maung (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Action recognition has become an important research topic in the computer vision area. This paper presents an efficient action recognition approach based on salient object detection. Recently, many features were directly ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Nwe, San San; Tun, Khin Nwe Ni (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With the proliferation of social media sites, such as Twitter, Facebook, and LinkedIn, social streams have proven to contain the most up-to-date information on current events. Therefore, it is crucial to extract activities ...
  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Mon, Ohnmar Min; Win, Tha Pyay; Mon, May Thida (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Software-Defined Networking (SDN) based architectures, such as Open Flow, offer a chance to design such a control plane. The SDN controller performs all complex functions, including routing and security checks. Segment ...
  • Thu, Pyae Phyo; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Ever escalating usage of social media brings as a powerful communication and information sharing tool used by millions of people around the world to post how they feel and what is happening now. It turn into a potential ...
  • Latt, Tin Myo; Thida, Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Morphological analysis (MA) is needed in any Natural Language Processing (NLP) Application. It means taking a word as input and identifying the stem and affix. MA provides information about a word’s semantics and the ...
  • Yamada, Hiroshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The characteristics of Lithium Ion Capacitor (below , abbreviated as LIC) as a charging device is similar to Lithium Ion Battery and has quite long life, it is 100 times more than Lithium Ion Battery charge and ...
  • Thu, Ei Ei; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, the significance of automated generation of object-oriented code from design models has increased due to its benefits, such as, cost reduction and time efficiency. This paper proposed a code generator for ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Khaing, Phyu Phyu; Nwe, Nwe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Real time monitoring of twitter tweet streams for trends has popularity in the last decade. This provide effective information for government, business and other organization to know what happening right now. The task ...
  • San, Lwin; Cho, Ei Mon; Koshiba, Takeshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In proxy re-encryption (PRE) scheme the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. ...
  • Nwe, Thazin; Yee, Tin Tin; Phyu, Myat Pwint; Htoon, Ei Chaw (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Cloud computing is becoming increasingly popular and cloud storage services attract more attentions for their high security and availability with a low cost. Cloud storage is expected to become the main force of the ...

Search Repository



Browse

My Account