Conferences: Recent submissions

  • Arakawa, Maiko; Okuyama, Yuichi; Mie, Shunsuke; Abderazek, Ben Abdallah (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    An attitude estimation is an important process for auto-piloting unmanned aerial vehicles (UAVs) control. We implemented the attitude estimation system from the visible horizon in the images. We use images from the ...
  • Myint, May Phone; Win, Thandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital image watermarking is a method trying to embed small image inside a large original image. The original image will be converted into frequency domain to obtain the Discrete Cosine Transform (DCT) matrices from its ...
  • Maw, Aye Aye; Tyan, Maxim; Lee, Jae-Woo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Majority of an autonomous Unmanned Aerial Vehicles (UAV) are currently operated by user or follow a pre-programmed flight path. The development of artificial intelligence (AI) technology forces development of dynamic ...
  • Soe, Nyein Chan; Thein, Thin Lai Lai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Road traffic congestion or jam is main problem in urban area of both developing and developed countries. In order to solve this problem, traffic congestion states of road networks are estimated so that congested road ...
  • Htun, Myo Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Audio fingerprinting is a smart technology to identify music contents relevant to the query by comparing the content-based hash (fingerprint) of the query to known hashes in the fingerprint database. For a million-song ...
  • Khaing, Mya Thet; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system ...
  • Aung, Ni Htwe; Thu, Ye Kyaw; Maung, Su Su (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Deaf people use Sign Language and Fingerspelling as a fundamental communication method. Fingerspelling or manual spelling is a method of spelling words using hand movements, and most often used to spell out names of ...
  • Win, Htwe Pa Pa; Khine, Phyo Thu Thu (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Communication between computer and human has become increasingly popular in today world. Investigation of human emotion importance is also growing in several domains. But under real world condition, speech signal is ...
  • Kyi, Khin Myo; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Security of exchanging private information over a non secure channel is important in communications system. Efficient cryptographic techniques are necessary to endow the security level in mail system. Email security is ...
  • Yee, Sann Su Su; Ding, Chenchen; Soe, Khin Mar (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    We present our work for morphological annotation on Myanmar part of the Asian Language Treebank project. Former NOVA annotation is a feasible and flexible annotation system for joint tokenization and POS tagging for ...
  • Hlaing, Chit Su; Zaw, Sai Maung Maung (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Plant disease classification is essential for food productivity and disease diagnosis in agricultural domain. The probability distribution and statistical properties are essential in image processing to define the ...
  • Thwe, Khine Zar; Thaw, Mie Mie (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    This paper presents texture feature extraction methods for sound classification. Nowadays, many researchers interest in combination of digital signal processing and digital image processing fields to get higher efficiency. ...
  • Win, Sandar; Thein, Thin Lai Lai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Nowadays, real-time information is very important and learning based human motion has fascinated range from detection to tracking state in Computer Vision. In this system, the real-time videos are used to detect, track, ...
  • Wai, Chit Hsu; Myo, Khin Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays Social Network analyses are receiving a lot of attention for researchers. By knowing the knowledge of social network, it can be applied in many application areas such as co-author finding, research group finding, ...
  • Cherry, Hnin; Sein, Myint Myint (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    With an importance of artificial intelligence in today’s world, deep learning technology has developed very powerful in solving many problems in various fields that is included in speech recognition, natural language ...
  • Tun, Kyaw Naing; Aye, Zin May; Khaing, Kyaw Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The number of applications for smart mobile devices is steadily growing with the continuous increase in the utilization of these devices. the Installation of malicious applications on smart devices often arises the ...
  • Myint, Moe Moe; Kyu, Khin Kyu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Image information is routinely used in many applications. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays an important role in protecting ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Protection of IEEE 802.11 networks means protection against attacks on confidentiality, integrity and availability. Possible threats come from vulnerabilities of security protocols. The rapid growth in the use of ...
  • Tun, Phyo Min (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The number of mobile users in Myanmar is rapidly growing since four main mobile operators (MPT, Telenor, Ooredoo, MyTel) launched distributing SIM card in lowest rate compare to past a few years ago. With the reforming ...
  • Myint, Khin Nyein; Aung, Win Thanda; Zaw, Myo Hein (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    This paper is applied an odd even transposition sorting algorithm with Raspberry Pi cluster to break down a computational problem into several parallel tasks of a distributed system. According to the test results, the ...

Search Repository



Browse

My Account