UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Than, Mu Mu; Yee, Khin Mar; Lint, Kyi; Han, Marlar; Hnin, Thet Wai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Water quality of a River is important as it is used for drinking, domestic purpose and agriculture. Hlaing River is one of the most important rivers in Yangon Region. The River plays an important role to supply water ...
  • War, Nu Nu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the increased amount of information rapidly available on the World Wide Web, Internet users that want to know opinions about products are becoming difficult to determine which product (entity) is the best on ...
  • Kim, Chang Soo; Won, Won Seok; Park, Man Gon; Rhee, Kyung Hyune; Kim, Young Seup (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Heavy rains have caused an amount of damage from flooding and landslides nationwide. Specially, because of flooded road when disasters occurred, traffic congestion and isolation have caused many losses to drivers during ...
  • Htet, Hlwam Maint Htet; Mya, Khin Than (2019-02-27)
    Access control systems regulate the access to critical resources and they are vitally important for every organization’s IT infrastructure. Access controls authenticate and authorize individuals to access or deny the ...
  • Aung, Wai Phyo; Lwin, Htar Htar; Lin, Kyaw Kyaw (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    In counteraction to the increasing threat of cyber terrorism, the modeling to be predicted in guessing the predictive models for estimating the incidence of cyber-attacks for enterprise network in Myanmar are seriously ...
  • Hlaing, Nwe Ni; Nyunt, Thi Thi Soe (ICCA, 2021-02-25)
    According to the development of technology, enormous amount of data are being generated as a continuous basis from Social media, IOT devices, and web etc. This lead to big data era. Many researchers are paying attention ...
  • Nwet, Khin Thandar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Efficient estimation and alignment procedures for word and phrase alignment are developed for the alignment of parallel text, and this is shown in Myanmar-English translation. Word alignment based on the combination ...
  • Yousuf, Khaled Bin; Bhuiyan, Touhid; Khan, Sharmin; Nahar, Aynun; Ali, Nawab Yousuf (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    One of the vital mission of e-learning is to allow people to learn for personal accomplishment or to earn a professional degree, without physically attending a traditional university or academic setting. E-learning can ...
  • Maw, Aye Aye; Tyan, Maxim; Lee, Jae-Woo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Majority of an autonomous Unmanned Aerial Vehicles (UAV) are currently operated by user or follow a pre-programmed flight path. The development of artificial intelligence (AI) technology forces development of dynamic ...
  • Lwin, Thandar; Maw, Aye Aye; Shu, Jung-Il; Kim, Jin-Wook; Lee, Jae-Woo; Kim, Sang-Ho (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This study describes multidisciplinary design framework development based on system engineering concept for various space launch vehicles to assist aeronautical engineers to successfully design mission and system ...
  • Aye, Nyein; Sandi, La Wynn (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    With the rapid increase in multi-user systems, the security issues relating to the password authentication become more and more important. Numerous cryptographic protocols also rely on passwords selected by users ...
  • Oo, Lwin Lwin (ICCA, 2021-02-25)
    Network Security and privacy are the main expected features in the field of online banking system. Internet banking (online banking) system provides banking services over the internet. It also provides convenience for users ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Tun, Amy; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Digital watermarking technology is now attracting considerable attention as one of the potential solutions for protecting copyrights of digital images. In this paper, digital color image watermarking scheme based on ...
  • Htet, Thu Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting a secret communication. Hiding a message will most likely leave detectable traces in the cover medium. The information hiding process changes the statistical properties ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Community Detection (CD) is an interesting research area in social network analysis. It becomes NP-hard problem in large network. Many researchers use heuristic algorithms to detect communities in social network. These ...
  • Nakajima, Shigeyoshi; Ikebuchi, Mitsuhiko (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A gait is one of indicators of health. We reported that the ratio of the step power per the stride power in Fourier transform harmonics of a gait shows a recovery from a damage of total hip replacement operation several ...
  • Htun, Win Pa Pa (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Building a new document needs the preparation of required information and finding the related written parts that have already identified from existing documents. In this paper, we outline the importance of structuring ...
  • Ei, Nyein Nyein (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The labeling scheme is used to label the nodes of an XML tree. Based on the labeling scheme, XML queries can be processed without accessing the original XML document. One more important point for the labeling scheme ...
  • Thu, May Phyo; Nwe, Khine Moe; Aye, Kyar Nyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Replication is an essential corner stone for data storage not only for traditional storage systems but also for cloud environment. Data popularity is a key factor in data replication as popular files are accessed most ...

Search Repository



Browse

My Account