UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Sein, Myint Myint; Yu, May The' (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Capturing of the digital images using multimedia devices and the digital cameras is becoming increasingly more popular. Annotating the digital pictures is important to support the browsing, i.e. search pattern and ...
  • Win, Khin Cho (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The security of data transferring is accepted as the challenging problem all over the world. In this system, the image file of any kinds of format is encrypted by using S-DES (Simplified Data Encryption Standard) in ...
  • Nguyen, Dinh Thuan; Nguyen, Tuan Anh; Phan, An Tung; Hoang, Tung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The aim of this study is to develop a solution to collect product information from multiple websites, and then investigate the relationships of various factors that affect customer satisfaction on a product using ...
  • Aung, Tun Tun (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    This paper proposes the common technical architecture framework for eGovernment Interoperability for Myanmar. It also recommends the interaction type/e-Government workflows in common for general e-government services ...
  • Oo, Khine Khine; Moe, Myint Myint (ICCA, 2021-02-25)
    Today software development society, we cannot omit the agile software development methodology as we are now living in the changing world, means technology change, economy change, market change, etc. Among them, the new ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Community structure in scientific collaboration network has become an important research area. Coauthor of a paper can be thought of as a collaborative document between more than one authors. Community detection in ...
  • Thaing, Aye Nwe (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Graph has become a powerful tool for representing and modeling objects and their relationships in various application domains such as protein interaction, social networks and chemical informatics. With the emergence of ...
  • Aye, Nilar (ICCA, 2021-02-25)
    Teaching evaluation is one of the most vital needs that have to be carried out to determine the quality of education in every academic institution. Higher education is mostly assessed by using the students’ grades achieved ...
  • Lwin, Htar Htar; Aung, Wai Phyo; Lin, Kyaw Kyaw (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This paper performs a comparative analysis of Android mobile forensics tools which are used for acquisition and analyzing of Android mobile devices. The major challenges of Android forensics investigation are manufacturing ...
  • Kyaw, Theingi; Htun, Zaw (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile phone based activity recognition uses data obtained from embedded sensors to infer user’s physical activities. Therefore, many mobile phones have been equipped with sensors to enable the delivery of advanced ...
  • Aung, Si Thu; Thein, Thandar (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays, many companies have branch offices and connect those offices to the main office over the Internet using a site-to-site Virtual Private Network connection. Most of these connections have always operated at ...
  • Shwe, Theint Theint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. As a consequence of this, Web Usage Mining becomes one of the popular research areas. It involves ...
  • Min, Aye; War, Nu (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The detection of brain cancer without human interfering is a major problem in the domain of medicinal image processing. The segmentation of brain images of MRI is a technique used as a first step to extract different ...
  • Hnin, Than Thida; Lynn, Khin Thidar (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Taxonomy is the science of naming, describing and classifying organisms that includes all plants, animals and microorganisms of the world. Using morphological, behavioral, genetic information and biochemical observations, ...
  • Win, Nay Aung Soe; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Big data in terms is the huge volume of data that is difficult to be processed, handled and managed. The term big data is an emerging trend where a number of researches and data scientists are carried out for data ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper makes a comparative study of the Extended Great Deluge (EGD) based hype heuristic (HH) for the university exam timetabling problem. Indeed, Hyper-Heuristic is not new in AI field. It is an emerged ...
  • Kyaw, Tin Ei (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The hazardous acoustic event classification system is presented and tested in threatening environments. The system is based on classified with Support Vector Machine (SVM), k Nearest Neighbor (kNN) and modeled with ...
  • Sein, Myint Myint; Htun, Baby (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Most of the time the destruction is performed by using the stationary objects like a timer bomb, explosives etc. A smart surveillance system can automatically detect stationary objects in public places. It has been ...
  • Aye, Kyar Nyo; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data continue a massive expansion in scale, diversity, and complexity. Data underpin activities in all sectors of society. Achieving the full transformative potential from the use of data in this increasingly digital world ...
  • Yu, Thanda Tin (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Social network analysis has undergone a renaissance with the ubiquity and quantity of content from social media, web pages, and sensors. This content is a rich data source for constructing and analyzing social networks. ...

Search Repository



Browse

My Account