UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Khaing, Soe Soe; Yin, Zin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In network-based data mining, clique percolation brings an attractive feature for finding communities in a graph as well as the overlapping areas of these communities. Despite complete clique formalization, some of the ...
  • Thu, Ye Kyaw; URANO, Yoshiyori (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We present the grapheme cluster segmentation tool for Myanmar text based on our proposed Positional Prediction text input concept. Motivation of this research is to develop the Positional Prediction database of Myanmar ...
  • Soe, Ei Phyu Phyu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Grapheme-to-Phoneme (GTP) conversion is one of the most important parts for text-to-speech synthesis of Myanmar language. TTS system is firstly faced with the conversion of input text into linguistic representation usually ...
  • Myint, Khin Swe Swe; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Datacenters have been the key system infrastructure for cloud computing. The demand for datacenter computing has increased significantly in recent years resulting in huge energy consumption. Renewable energy resources, ...
  • Chui, Chee-Kong; Nguyen, Binh P. (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Computer aided surgery and computer assisted robotic surgery are having more and more impact on medical care. This paper presents the architecture and work flow of an intelligent surgical robotic system that we ...
  • Htike, Theingi; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar handwritten characters. This paper involves three important steps, ...
  • Htike, Theingi; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper an attempt is made to develop Myanmar handwritten character recognition system. Character recognition is an important area in image processing and pattern recognition fields. The aim of character recognition ...
  • Khing, Yadanar; Sein, Myint Myint; Win, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Handwriting authentication is considered as the most natural method of authenticating a person’s identity compared to other biometric and cryptographic forms of authentication. It involves specialize human skills and ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Disaster recovery (DR) is an important element of the complex information technology (IT) systems. The availability of the IT for everything, from everywhere, at all time is a growing requirement. Effective IT strategies ...
  • Phyu, Myat Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Today’s storage systems have a great challenge for the long-term storage of massive amounts of unstructured data. Availability and reliability is the properties of the most storage system. In this paper, the data ...
  • Myint, Khin Su Mon; Naing, Win Win (ICCA, 2021-02-25)
    For each developing country, historical census population data are the most useful. It provides valuable information on a certain region of a nation. The matching historical census data means that many population census ...
  • Khine, San Nyein; Tun, Zaw (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Automation system is famous for all over the world. Nowadays, people have been trying to control everything automatically without any physical efforts. In the proposed work, home automation system has been introduced ...
  • Arakawa, Maiko; Okuyama, Yuichi; Mie, Shunsuke; Abderazek, Ben Abdallah (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    An attitude estimation is an important process for auto-piloting unmanned aerial vehicles (UAVs) control. We implemented the attitude estimation system from the visible horizon in the images. We use images from the ...
  • Cho, Tin Zar Wint; Win, May Thu (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    This paper is related to the domain of human activity recognition in both depth images and skeleton joints. In this paper, for the detection task, a RGB-D sensor (Microsoft Kinect) is used. To obtain discriminative ...
  • Lwin, Nang Khine Zar; Naing, Tin Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Distributed Database has been used as the most essential technology for business organizations in recent years. The data allocation is a critical issue in distributed database design. Allocation of data among different ...
  • Thwin, Thein Than; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The term Advanced Persistent Threat (APT) is used as a replacement term for cyber warfare and malware has developed into the major vehicle for APT. Malware analysis and detection is a major resource in maintaining ...
  • Htwe, Thet Thet; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Due to the increase in the use of internet and rise in number of network attacks, intrusion detection has become significant research issue. The objective of this work is to propose a hybrid intrusion detection system ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Now day’s security is the primary concerned in the field of computer science.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional ...
  • Thandar, Aye Mya (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Several recent machine learning publications demonstrate the utility of using feature selection algorithms in many learning. Feature selection helps to acquire better understanding about the data by telling which the ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays the provision of online services by government or business organizations has become a standard and necessary operation. Transferring data including the confidential or sensitive information via Internet or ...

Search Repository



Browse

My Account