UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Wai, Khaing Phyo; Thu, Ei Ei (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Social network analysis (SNA) is the study of social networks to understand their structure and behavior. The study of the social networks is the possibility of collecting web log data. The data used for analyzing ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The android speech recognizer acquires speech at run time through a microphone and processes the sampled speech to recognize the uttered text. But the output texts do not match with users’ data because English and ...
  • Cuong, Nguyen Phu; Nedev, Zhivko; Tin, Duong Trung; Tu, Le Anh (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    We describe the design and implementation of a computer application that can search for a small size balanced set modulo p, with p prime. Additionally, the application can”analyze” and ”visualize” any given balanced set ...
  • Soe, Yan Naung; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Mobile devices have gained tremendous popularity over the last few years. The most popular usage is the smart phones. They are accepted and admired by many mainly because they are capable of providing services such as ...
  • Yu, Thein; Nwet, Khin Thandar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    This paper presents a corpus of Myanmar News and its metadata, annotated with sentiment polarity. It contains 100 news from Myanmar media websites such as news-eleven.com, 7daydaily.com and popularmyanmar.com. This news ...
  • Ko, Mon Mon; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    New security threats emerge against mobile devices as the devices’ computing power and storage capabilities evolve. Preventive mechanisms like authentication, encryption alone are not sufficient to provide adequate ...
  • Thein, Khin Me Me; Nyunt, Thi Thi Soe (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Apache Kafka is publish-subscribe messaging implemented as a distributed commit log, suitable for both offline and online message consumption. It is a messaging system initially developed at LinkedIn for collecting and ...
  • Mon, Soe Soe; Kham, Nang Saing Moon; Aung, Than Htike (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    In current years, there have been development of the number of intelligent tools based Radio Frequency Identification (RFID). RFID systems have been used successfully working to many areas such as transport, health ...
  • Aung, Swe Swe; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, monitoring road and traffic prediction in urban area is becoming an important role in developing countries like ours. It is the most important part that getting and performing the accurate traffic data in all ...
  • Myint, Cynthia (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Part-of-Speech tagging is the process of marking up the words in a text as corresponding to a particular part of speech based on both its definition, as well as its context. Tagsets and word disambiguation rules are ...
  • Hsan, Nu War; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Due to uncontrolled exponential growth in web data, knowledge based retrieval has become a challenging task. The one viable solution to the problem is the merging of conventional web mining with semantic technologies. There ...
  • Tun, Tayar Myo (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many sudden and short period noises in natural envrioments. In this paper, noise reduction is efficiently performed for additive white noise and an automatic thresholding method for discriminating of noise / ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Traveling salesman problem (TSP) is one of the most famous combinatorial optimization (CO) problems, which has wide application background. Ant Colony Optimization (ACO) is a heuristic algorithm which has been proven ...
  • Nguyen, Dinh Thuan; Lam, Vu Tuan Nguyen; Nguyen, Gia Toan; Hoang, Tung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, the application of data mining in the healthcare industry is necessary. Data mining brings a set of tools and techniques that can be applied to discover hidden patterns that provide healthcare professionals ...
  • Khin, Nyein Pyae Pyae; Hlaing, Chaw Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The structure of idioms and phrasal verbs are flexible in nature hence quite complex and challenging to handle in machine translation system. In this paper, an approach to handle idioms and phrasal verbs for English-Myanmar ...
  • Dihego, Jose; Braga, Andre; Ramos, Rodrigo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Several efforts in the last years have demonstrated a trend in using models as first class entities on system development. As any major artefact in the development, models are driven by stakeholder and architectural ...
  • Yee, Tin Tin; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud storage server design and services play a vital role in the cloud computing infrastructure. Cloud storage focused at the enterprise to that focused on end users, as well as it providers offer huge capacity ...
  • Thandar, Aye Mya; Khaing, Myo Kay (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Artificial neural networks (ANNs) are new technology emerged from approximate simulation of human brain and they have been successfully applied in many fields. Many researchers have tried to achieve optimal or near-optimal ...
  • Maw, Soe Yu; Khine, May Aye (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Big social data analytics is an important tool which can be used to reveal the important insight of the information from the social user. It is an approach which combines various statistical methods, sentiment analysis, ...
  • Tint, Yawai; Mya, Khin Than (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting messages hidden using steganography. This paper proposes steganalysis of audio signal using Independent Component Analysis. A detection method is used for detecting ...

Search Repository



Browse

My Account