UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • TSUBAKI, Hajime; OGAMI, Takeru; KONDO, Mariko; SAGISAKA, Yoshinori (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Aiming at objective evaluation of L2 (second language) learners' proficiency, we statistically analyzed mispronunciation characteristics of Japanese learners' English speech based on phonetic knowledge. Through automatic ...
  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In client-server type, due to repeated and potentially faulty usage of long running server is requested by many clients, such software "ages" with time and eventually fails. We show that virtualization promotes a new ...
  • Lwin, Zin Mar; Thaw, Mie Mie (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Brain Computer Interface (BCI) Systems have developed for new way of communication between computer and human who are suffer from severe motor disabilities and difficult to communicate with their environment. BCI let ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Win, Myat Su; Khin, Thet Thet (ICCA, 2021-02-25)
    Essential role of Internet-based communication is the security of information. Classical Cryptography is based on mathematical models and computational complexity to compute the secret key. It does not provide enough ...
  • Aung, Yi Yi; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...
  • Aung, Hay Mar Su; Pa, Win Pa (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This paper presents a study of comparison on three different machine learning techniques to sentiment analysis for Myanmar language. The fundamental part of sentiment analysis (SA) is to extract and identify the ...
  • Soe, Ei Phyu Phyu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Speech synthesis system is a popular field in natural language processing of computer science for various languages. The process of speech synthesis is to produce the human-like speech from corresponding language and ...
  • Tun, Kyaw Naing; Aye, Zin May; Khaing, Kyaw Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The number of applications for smart mobile devices is steadily growing with the continuous increase in the utilization of these devices. the Installation of malicious applications on smart devices often arises the ...
  • Htun, Myo Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Audio fingerprinting is a smart technology to identify music contents relevant to the query by comparing the content-based hash (fingerprint) of the query to known hashes in the fingerprint database. For a million-song ...
  • Aung, Su Wit Yi; Khaing, Soe Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Land use and land cover change has become a vital component in current strategies for managing natural resources and monitoring environmental changes. Analyzing the changing of hydrological area, vegetation area and ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing paradigm contains many shared resources such as infrastructures, data storage, various platforms and software. In cloud storage service, consistency not only influences the performance and availability ...
  • Myo, Zin Mar; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Long Term Evolution (LTE) is a mobile network that operates completely in packet domain. Due to the variation of radio condition in LTE, the obtainable bit rate for active users will vary. The two factors for radio ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data Centre (DC) administrators try to delivering performance guarantees while managing resources for utilization in terms of reducing cost. With the advent of server consolidation provided by virtualization technology, ...
  • Htun, Phyu Thi; Win, Mya Thidar Myo; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many Intrusion Detection System (IDS) based on signatures. If a new attacks, which by definition cannot be in the database of signatures is coming, those system cannot detect. The attackers will have a new way ...
  • Win, Mya Thidar Myo; Htun, Phyu Thi; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. Current ...
  • Aung, Khin Zezawar; Myo, Nyein Nyein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Opinion mining, which is also known as Sentiment Analysis, is an interesting field to analyze people’s opinions, sentiments, attitudes and appraisals. There are several approaches to analyze the textual data using sentiment ...

Search Repository



Browse

My Account