UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Chui, Chee-Kong; Nguyen, Binh P. (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Computer aided surgery and computer assisted robotic surgery are having more and more impact on medical care. This paper presents the architecture and work flow of an intelligent surgical robotic system that we ...
  • Htike, Theingi; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar handwritten characters. This paper involves three important steps, ...
  • Htike, Theingi; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper an attempt is made to develop Myanmar handwritten character recognition system. Character recognition is an important area in image processing and pattern recognition fields. The aim of character recognition ...
  • Khing, Yadanar; Sein, Myint Myint; Win, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Handwriting authentication is considered as the most natural method of authenticating a person’s identity compared to other biometric and cryptographic forms of authentication. It involves specialize human skills and ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Disaster recovery (DR) is an important element of the complex information technology (IT) systems. The availability of the IT for everything, from everywhere, at all time is a growing requirement. Effective IT strategies ...
  • Phyu, Myat Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Today’s storage systems have a great challenge for the long-term storage of massive amounts of unstructured data. Availability and reliability is the properties of the most storage system. In this paper, the data ...
  • Myint, Khin Su Mon; Naing, Win Win (ICCA, 2021-02-25)
    For each developing country, historical census population data are the most useful. It provides valuable information on a certain region of a nation. The matching historical census data means that many population census ...
  • Khine, San Nyein; Tun, Zaw (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Automation system is famous for all over the world. Nowadays, people have been trying to control everything automatically without any physical efforts. In the proposed work, home automation system has been introduced ...
  • Arakawa, Maiko; Okuyama, Yuichi; Mie, Shunsuke; Abderazek, Ben Abdallah (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    An attitude estimation is an important process for auto-piloting unmanned aerial vehicles (UAVs) control. We implemented the attitude estimation system from the visible horizon in the images. We use images from the ...
  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Lwin, Nang Khine Zar; Naing, Tin Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Distributed Database has been used as the most essential technology for business organizations in recent years. The data allocation is a critical issue in distributed database design. Allocation of data among different ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Now day’s security is the primary concerned in the field of computer science.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional ...
  • Thandar, Aye Mya (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Several recent machine learning publications demonstrate the utility of using feature selection algorithms in many learning. Feature selection helps to acquire better understanding about the data by telling which the ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays the provision of online services by government or business organizations has become a standard and necessary operation. Transferring data including the confidential or sensitive information via Internet or ...
  • Yee, Tin Tin; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure. Cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of ...
  • Aung, Htain Lynn; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    E-learning is the fast and essential method of delivering educational contents. E-learning can support one of the alternative ways of quality teaching and learning as well as lifelong learning. The paper argues for the ...
  • Oo, Sheinn Thawtar; Thida, Aye (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    At the present time, machine translation is progressively more and more used to support multilingual communications. In the process of machine translation, uses of figurative language are one of the reasons that can cause ...
  • Aung, Myintzu Phyo (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In machine translation system of Myanmar to English, grammar rules are used to translate the whole input Myanmar sentences to target English sentences. These rules are based on the pattern of simple sentences in ...

Search Repository



Browse

My Account