UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Maw, Aye Aye; Tyan, Maxim; Lee, Jae-Woo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Majority of an autonomous Unmanned Aerial Vehicles (UAV) are currently operated by user or follow a pre-programmed flight path. The development of artificial intelligence (AI) technology forces development of dynamic ...
  • Lwin, Thandar; Maw, Aye Aye; Shu, Jung-Il; Kim, Jin-Wook; Lee, Jae-Woo; Kim, Sang-Ho (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This study describes multidisciplinary design framework development based on system engineering concept for various space launch vehicles to assist aeronautical engineers to successfully design mission and system ...
  • Aye, Nyein; Sandi, La Wynn (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    With the rapid increase in multi-user systems, the security issues relating to the password authentication become more and more important. Numerous cryptographic protocols also rely on passwords selected by users ...
  • Oo, Lwin Lwin (ICCA, 2021-02-25)
    Network Security and privacy are the main expected features in the field of online banking system. Internet banking (online banking) system provides banking services over the internet. It also provides convenience for users ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Tun, Amy; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Digital watermarking technology is now attracting considerable attention as one of the potential solutions for protecting copyrights of digital images. In this paper, digital color image watermarking scheme based on ...
  • Htet, Thu Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting a secret communication. Hiding a message will most likely leave detectable traces in the cover medium. The information hiding process changes the statistical properties ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Community Detection (CD) is an interesting research area in social network analysis. It becomes NP-hard problem in large network. Many researchers use heuristic algorithms to detect communities in social network. These ...
  • Nakajima, Shigeyoshi; Ikebuchi, Mitsuhiko (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    A gait is one of indicators of health. We reported that the ratio of the step power per the stride power in Fourier transform harmonics of a gait shows a recovery from a damage of total hip replacement operation several ...
  • Htun, Win Pa Pa (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Building a new document needs the preparation of required information and finding the related written parts that have already identified from existing documents. In this paper, we outline the importance of structuring ...
  • Ei, Nyein Nyein (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The labeling scheme is used to label the nodes of an XML tree. Based on the labeling scheme, XML queries can be processed without accessing the original XML document. One more important point for the labeling scheme ...
  • Thu, May Phyo; Nwe, Khine Moe; Aye, Kyar Nyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Replication is an essential corner stone for data storage not only for traditional storage systems but also for cloud environment. Data popularity is a key factor in data replication as popular files are accessed most ...
  • Naing, Htet Htet; Aye, Zin May; Naing, Soe Kalayar (ICCA, 2021-02-25)
    Today, technology change is very fast. Security and fast processing are necessary for data transformation. The health system is related to important roles in any country for its national interest. E-health care system ...
  • Aung, Darli Myint (2012-02-28)
    Facial feature extraction is an essential step in the face detection and facial expression recognition frameworks. To develop a better facial expression recognition system, a good feature extraction method is needed. ...
  • Zaw, Sai Maung Maung; Maw, Aung Htein; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In wireless sensor networks (WSNs), energy is a very scarce resource and has to be managed wisely in order to extend the life of the sensors. Therefore, to be energy-efficient, this paper is presented as hybrid protocol ...
  • Sithu, Mya; Ishibashi, Yutaka; Fukushima, Norishige (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In this paper, we handle joint performance of a networked haptic drum system where two users play a drum set in a 3D virtual space with the same rhythm at the same tempo. In order to improve the interactivity, we propose ...
  • Lei, Wyne Lei; Ishibashi, Yutaka; Mya, Khin Than (ICCA, 2021-02-25)
    In this paper, we examine the effect of prediction control in a remote haptic control system by Quality of Experience (QoE) assessment. In the system, a user operates a haptic interface device (just called a haptic device ...
  • Nhway, Ohnmar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Nowadays, Voice over IP (VoIP) is a major and challenging task for communication technology. In this paper, we focus on VoIP which transmits voice over packet switched networks such as LANs or WANs. Adding security ...
  • Kanaishi, Kazuya; Ishibashi, Yutaka; Huang, Pingguo; Tateiwa, Yuichiro (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    By experiment, this paper investigates the effect of the stabilization control with filters to suppress instability phenomena for tele-robot systems with force feedback by using a master-slave relation. As the quality ...
  • Mung, Pau Suan; Phyu, Sabai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Healthcare big data is a collection of record of patient, hospital, doctors and medical treatment and it is so large, complex, distributed and growing so fast that this data is difficult to maintain and analyze using ...

Search Repository



Browse

My Account