UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Aung, Swe Swe; Nagayama, Itaru; Tamaki, Shiro (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    K-nearest neighbor algorithm is one of the most popular classifications in machine learning zone. However, as k-nearest neighbor is a lazy learning method, when a system bases on huge amount of history data, it faces ...
  • Phyu, Hnin Pwint; Nyunt, Thi Thi Soe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software maintainability prediction enables organizations to predict the maintainability of the software systems and can then help in reducing the maintenance effort and thus, reducing the overall cost and time spent ...
  • Phyo, Zar Lwin; Thein, Thandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Resource allocation plays an important role in Virtualized Data Center (VDC). The applications running in VDC are mostly business critical applications with Quality-of-Service (QoS) requirements. Moreover, dynamic ...
  • Khine, Aye Aye; Khin, Hnin Wint (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays, data stream mining is a very hot and high attention research field due to the real-time industrial applications from different sources are generating amount of data continuously as the streaming style. To ...
  • Kyaw, Win Thuzar; SAGISAKA, Yoshinori (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-16)
    Following the successful findings of high correlations between speech and color such as F0 and Value, Loudness and Saturation and Spectrum and Hue, we analyzed the correlations between voice source characteristics and ...
  • Nwe, Thazin; Yee, Tin Tin; Htoon, Ei Chaw (ICCA, 2021-02-25)
    The communication between data accessibility and consistency becomes a challenge of replica selection for a Key-Value Storage (KVS). Applying a fixed replica selection policy in numerous data centers may decrease the ...
  • Win, Kyaw Thu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Cloud computing technology becomes most popular in modern technology environment. Users store their data on third-party storage, cloud storage provider. In this case, security concerns arise to protect their stored ...
  • Yee, Thiri The` Wut; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Smartphones are more and more gaining popularity, creating novel application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile applications ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Cloud Computing is one of the converging technology trends in Information Technology which can pave the way to optimized computing solution. Several research issues exist in these converging technologies. Among them, ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The RDF (Resource Description Framework) model has attracted the attention of the database community and many researchers have proposed different solutions to store and query RDF data efficiently. This paper proposes ...
  • Baral, Amit Raj; Koshiba, Takeshi (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Increasing dependency of data availability and the fear of losing the private information during com- munication motivate the need of privacy protection. One of the common problems occurs when two par- ties need to ...
  • Latt, Win Zaw (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Today, data migration is important to the organizations to transform the data sources of old systems to the new systems. Most companies do data migration to update their systems. Data migration is the process of moving ...
  • Aung, Zayar; Sergeevich, Mihailov Ilya; Aung, Ye Thu (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The purpose of this work is to create a learning algorithm which is based on accumulated historical data on previously drilled wells. Wells will forecast an emergency accompanied by drilling. Such a decision support ...
  • Aye, Kyar Nyo; Thein, Thandar (Twelfth International Conference on Computer Applications (ICCA 2014), 2014-02-17)
    Data rebalancing is one of the most interesting research areas in distributed file systems. In Gluster file system, data among the storage servers are rebalanced after adding a new storage server to the Gluster storage ...
  • Aung, Hsu Mon Lei; Win, Aye Sandar; Hlaing, Swe Zin (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, it is clear that a huge data storage is needed to store very large amount of textual unstructured data. Compression is an effective technique to less data storage space. Most unstructured data are random or ...
  • Tun, Myint Thu Zar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, the government in every country needs to reduce the living standard gap between the rural and urban. Also, the government decides on the enormous amount of data regarding development facilities to become the ...
  • Hnin, Thuzar; Oo, Khine Khine (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Today’s many modern organizations, to get competitive advantages, have been already implemented business process management (BPM). However, as part of a larger business process management initiative, especially predictive ...
  • Zaw, San Kyaw; Oo, Khine Khine (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The evolution of web has positively transformed the paradigm of communication, trading, and collaboration for the benefit of humanity. However, these benefits of the Web are shadowed by cyber-criminals who use the Web ...
  • Aung, Tun Myat; Oo, Myo Myint (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, any kinds of cyber-attacks are firstly attacked to web site and the site contains information about business, government and other organizations. So, the role of web page security is becoming the essential ...
  • Hlaing, May Me Me; Kham, Nang Saing Moon (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Social network and online news media are becoming popular in today’s era. Due to low cost, easy access and rapid diffusion, social media platform becomes a source to distribute false information. Fake news propagation ...

Search Repository



Browse

My Account