Conferences: Recent submissions

  • Latt, Tin Myo; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural language processing is normally used to describe the function of computer system which analyze or synthesize spoken or written language. One area of Natural language processing is concerned with creating proofing ...
  • Naing, May Thu; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In today’s era, when the size of information and data is increasing exponentially, there is an upcoming need to create a concise version of the information available. This paper presents a summary generation system ...
  • Zan, Thu Thu; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural disaster cannot be prevented, but its impacts can be eliminated or reduced. Mobile devices are the most effective and convenient communication tools which are not restricted by time and place. In this paper, ...
  • Win, Ei Phyu; Aye, Nyein (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Biometrics is a method for recognizing based on physiological and behavioral characteristics. Iris recognition is one of the robust biometric technologies used for authentication applications. An iris recognition system ...
  • Mon, Khin Lay; War, Nu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Automatic image segmentation is a very important task for image analysis, object detection and recognition tasks. In this research, automatic image segmentation system is proposed which includes three main approaches: ...
  • Aye, Nilar; Naing, Thinn Thu (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper proposes a framework to construct a knowledge base by using crowdsourcing approach. The various inputs have been asserted into database interactively by crowd of people via internet. The support of travel ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    With the enormous growth of computer networks, network security is gaining increasing importance. Therefore, the role of Intrusion Detection Systems (IDSs) is becoming more important. There are many techniques ...
  • Phyo, Aye Su; Tun, Khin Nwe Ni (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Binarization is one of sub phases of preprocessing step of optical character recognition (OCR). Binarization is separation of foreground text from background of document image. The accuracy of OCR mainly relies on ...
  • Khaing (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Enterprise resource planning (ERP) system has been one of the most popular business management systems, providing benefits of real-time capabilities and seamless communication for business in large organizations. ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As the internet evolves and computer networks become bigger and bigger, network security is one of the most challenging issues in today's world that touches many areas using network communication. Nowadays, there is a ...
  • Maung, Hsu Mon; Win, Kay Thi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Nowadays, web application is crucial for most daily activities that rely on the web services. To improve the quality of reliable web services, web application testing has been used in finding faults under test. User ...
  • Htun, Baby; Sein, Myint Myint (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Object motion and human motion tracking is an important technique used in many systems, especially in the fields of computer vision. An automatic motion tracking and catching system is developed in this research. It ...
  • Myint, Theint Zarni (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Speech recognition reduces the overhead caused by alternate communication methods. Speech has not been used much in the field of electronics and computers due to the complexity and variety of speech signals and sounds. ...
  • Yu, Tin Tin; San, Tin Tin (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    As the size of the World Wide Web increase and search engines play an important part for the retrieving information. Search Engines provide the gateway for users trying to explore information from web pages. The purpose ...
  • Aye, Hnin Mya; Win, Si Si Mar; Soe, Thin Thin (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Cloud computing is a distributed computing paradigm in which computing resources, software, applications, information, and infrastructures are dynamically offered as services over the internet. Since distributed services ...
  • Win, Lai Lai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Web search has become amazingly powerful in its ability to discover and exploit nearly any kind of information that comprises the web. However, as powerful and large as current web search engine are , stilled limited ...
  • Linn, Khaing Wah Wah; Phyu, Sabai (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Nowadays, a large number of web pages contained useful information is often accompanied by a large amount of noise such as banner advertisements, navigation bars, copyright notices, etc. These noise data can seriously ...
  • Win, May Thu; Win, Kay Thi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    A fundamental problem in image processing is image segmentation. The conventional image segmentation methods, to some extent, all suffer from the problem of inaccurate segmentation. A slightly easier and more approachable ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Thu, Pyae Phyo; Lynn, Khin Thidar (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...

Search Repository



Browse

My Account