UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Kyaw, Tin Ei (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The hazardous acoustic event classification system is presented and tested in threatening environments. The system is based on classified with Support Vector Machine (SVM), k Nearest Neighbor (kNN) and modeled with ...
  • Sein, Myint Myint; Htun, Baby (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Most of the time the destruction is performed by using the stationary objects like a timer bomb, explosives etc. A smart surveillance system can automatically detect stationary objects in public places. It has been ...
  • Aye, Kyar Nyo; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data continue a massive expansion in scale, diversity, and complexity. Data underpin activities in all sectors of society. Achieving the full transformative potential from the use of data in this increasingly digital world ...
  • Yu, Thanda Tin (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Social network analysis has undergone a renaissance with the ubiquity and quantity of content from social media, web pages, and sensors. This content is a rich data source for constructing and analyzing social networks. ...
  • Tun, Zar Zar; Nwe, Khin Htar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everything that can be watched on a screen uses video coding which tends to reduce the amount of redundant video data in video compression. The idea behind video compression based on motion estimation is to save number ...
  • Thu, Aye Aye; Mya, Khin Than (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Privacy is one of the basic rights for individuals and institutions that need to preserve their confidentiality. Blind signature is widely used for various applications of e-commerce like digital payment system and ...
  • Soe, Yan Naung; Oo, Khine Khine (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The software defect can cause the unnecessary effects on the software such as cost and quality. The prediction of the software defect can be useful for the developing of good quality software. For the prediction, the PROMISE ...
  • Aung, Nyein Thwet Thwet; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents Word Sense Disambiguation for Myanmar Language. Word Sense Disambiguation (WSD) is an intermediate but an important step in Natural Language processing. WSD is defined as the task of finding the ...
  • Htun, Thaung Myint; Tun, Zaw (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Supervised Machine Learning is the search for algorithms that reason from externally supplied instances to produce general hypothesis, which then make predictions about future instances. This paper describes various ...
  • Thu, Aye Aye; Mya, Khin Than (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Today blind signatures scheme are important techniques and can be used in many e-commerce services, such as electronic voting and cash payment system.Privacy is one of the basic rights for individuals and institutions ...
  • Aung, Nay Aung; Ko, Aye Chan (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, steganography plays a critical role in Information Security. A number of steganographic algorithms have been proposed by focusing on this property of a steganographic system. It is needed two bytes to hide ...
  • Tun, Mi Swe Zar; Kyi, Hsu Mon; Htoon, Ei Chaw (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Functionality on mobile devices are ever richer in daily life. Mobile devices have limited resources like battery life, storage and processor, etc. Offloading some computing tasks from mobile devices to the cloud is a ...
  • Swe, Thinn Mya Mya (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A digital library is a type of information retrieval (IR) system. The existing information retrieval methodologies generally have problems on keyword-searching. We proposed a model to solve the problem by using ...
  • Nyunt, Thi Thi Soe; Phyu, Hnin Pwint (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Designing, understanding and maintaining the source code is a crucial task in reengineering for software maintenance. Formal Concept Analysis (FCA) is a mathematical technique which has been applied in several fields and ...
  • Kyae, K; Aung, Win Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Word sense disambiguation (WSD) is an important technique for many NLP applications such as machine translation, content analysis and information retrieval. In the information retrieval (IR) system, ambiguous words are ...
  • Aung, Htain Lynn; Kham, Nang Saing Moon (ICCA, 2021-02-25)
    The development of ICT for Education in Myanmar is crucial for digital education transformation and sustainable development to be in line with the targets of the National Education Policy and Global Sustainable Development ...
  • Tun, Phyo Min (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The number of mobile users in Myanmar is rapidly growing since four main mobile operators (MPT, Telenor, Ooredoo, MyTel) launched distributing SIM card in lowest rate compare to past a few years ago. With the reforming ...
  • Aung, Tun Tun (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The increasing use of ICTs for commercial and administration activities, specifically in an Internet environment, requires laws and regulations to address a set of issues, such as the legal validity of electronic documents, ...
  • Htet, Soe Yadanar Ko; Yee, Nyo Nyo (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Distributed Database Management System (DDBMS) is becoming interested due to the declining cost of computer hardware and geographically dispersed organizations where data processing is increased. A distributed database is ...
  • Yee, Nyo Nyo; Thant, Hnin Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In mobile environment, transactions are initiated from mobile host and that may be executed at mobile host or fixed host. This system proposes Two-Shadow Speculative Concurrency Control (SCC-2S) with Priority mechanism for ...

Search Repository



Browse

My Account