UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Hlaing, Thuzar; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is ...
  • Cherry, Hnin; Tateiwa, Yuichiro; Aye, Zin May (ICCA, 2021-02-25)
    There are several students who cannot understand the mechanism of communication, which is a part of TCP/IP, by taking lectures and reading textbooks. Our system helps students to understand it by observing network behavior ...
  • Sue, Khin Mo; Kyi, Tin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The main aim of this paper is to develop a system for classifying the soil class of Myanmar by the help of Error Back-propagation algorithm (EBP) which is the most widely used algorithm among Artificial Neural Network (ANN ...
  • Oo, Thazin Myint; Thu, Ye Kyaw; Soe, Khin Mar; Supnithi, Thepchai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This work explores the first evaluation of the quality of neural machine translation between Myanmar (Burmese) and Dawei (Tavoyan). We also developed Myanmar-Dawei parallel corpus (around 9K sentences) based on the ...
  • Tun, Khin Mo Mo; Thein, Htet Thazin Tike (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. In this paper, the adaptation of network ...
  • Winn, Aung Phyo; Troyanovskyi, V.M. (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Detecting signals with hidden periodicity is a wide and popular task in most complicated technical systems. The fields, where this problem is observed, can be astrophysics, engineering and mechanics, adaptive control, ...
  • Kywe, Wyne Wyne; Murakami, Kazuhito (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Real-time system requires not only the perfect result but also the partial usable result which produces in time under time restriction. Morphological method is a tool for extracting image components that are useful in ...
  • Naing, Win Win; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, the classic technology called cloud computing is very hot topic. It is widely developed in various environments such as information technology, business and medical, etc. Cloud computing platform offers ...
  • HarmokoSaputro, Adhi; Mustafa, Mohd. Marzuki; Hussain, Aini (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A computer-based of cardiac diagnosis system is needed to assist a cardiologist to evaluate the coronary artery disease quantitatively. In this paper, a computer-based global and regional diagnosis is developed to ...
  • Aye, The` Seint; Soe, Than Naing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Khaing, Aye Aye; Mar, Khin Thet (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In data communication, cryptography is necessary when communication over insecure channel. In many business sectors, secure and efficient data transfer is essential. Cryptography provides the basics for authentication of ...
  • Hliang, Yi Yi; Tun, Khin Nwe Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, XML plays an important role as a de facto standard online data exchange mechanism. In this paper, we present NFA-based filtering technique of XML document for multiple XPath queries using ontology. In our ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...
  • Linn, Khaing Wah Wah; Phyu, Sabai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Nowadays, a large number of web pages contained useful information is often accompanied by a large amount of noise such as banner advertisements, navigation bars, copyright notices, etc. These noise data can seriously ...
  • Sin, Ei Shwe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, scheduling problems arise in almost all areas of human activity. To handle the complexity of the real world scheduling problems, many researchers have been invested over the years. Currently research is being ...
  • San, Lwin; Cho, Ei Mon; Koshiba, Takeshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In proxy re-encryption (PRE) scheme the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. ...
  • Oo, Sheinn Thawtar; Thida, Aye (ICCA, 2021-02-25)
    Figurative languages can be found in all areas of human activities, literary, discourse and conversation. Metaphor, which is one of the figurative languages, becomes a problem in natural language processing (NLP). In Myanmar ...
  • Vaish, Abhishek; Jha, Anand Sanjeev Kumar Atul Krishna (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The main area of discussion of our paper “Security of Mobile Agent” is on the host platform attacking the mobile agents. Malicious host is a system in network which can take advantage of a mobile agent. A malicious ...
  • Wadan, Christen Mohamed (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    High biomass consumptions have large social, economic and ecological blessings as well as challenges to contend with. Computing biomass determinations demand renewable and non-renewable energy fact-findings. The study aims ...

Search Repository



Browse

My Account