UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Soe, The` The` (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A variety of Verb Phrase exists in Myanmar Language including Simple Verb Phrase, Compound Verb Phrase and so on. This paper explains the feature of Myanmar Verb Phrase and English Verb Phrase. And then, the system ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Protection of IEEE 802.11 networks means protection against attacks on confidentiality, integrity and availability. Possible threats come from vulnerabilities of security protocols. The rapid growth in the use of ...
  • Wint, May Thu; Thein, Yadana (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Steganography is the technique of hiding the communication data by hiding data in another different format of data.Even though many different carrier file formats can be used, digital images are the most commonly used ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Thant, Lwin May; Phyu, Sabai (ICCA, 2021-02-25)
    In a medical problem, investigation of powerful new tools is involved in essential role of high-throughput sequencing technologies. Microarray data sequencers produced a large and complex sets of data for the advancement ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Private retrieval of public data is important when a client wants to query a public data service without revealing the query to the server. So, we want to use a practical and flexible approach for the private retrieval ...
  • Saw, Mya Thet (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The main objective of this paper is to implement a control unit for the 16 bit CPU used in Microprocessor Trainer. In Microprocessor Trainer, there are six modules and they are connected by the address bus (A [0...15]), ...
  • Aye, Tin Moe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Since Fast Fourier Transforms are key components in many of the Digital Signal Processing applications and it is computationally intensive, a software implementation might not meet essential requirements in real time ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Aung, Zayar; Aung, Ye Thu; Sergeevich, Mihaylov Ilya; Linn, Phyo Wai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The article deals with the problem of timely forecasting and classification of problems that arise in the process of well construction remains relevant. It is necessary to create a new methodology that should help ...
  • Nyo, Khin Mar; Win, Khine Zar Ne (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    In the process of developing software and fulfilling to the current trends, every modularized concern needs Extensibility, Changeability, Design Stability and Sustainability. Our study implements the software metrics ...
  • Zan, Thu Thu; Phyu, Sabai (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    With advances in location based services, tracking the changing position of devices is becoming a new challenge. Mobile devices are the most effective and convenient communication tools which are not restricted by time ...
  • Hsan, Nu War; Phyu, Sabai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Web prediction is a classification approach to predict the next step of Web pages that a user may visit on the knowledge of the previously visited pages. The web usage mining techniques are used to analyze the web usage ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Ant Colony Optimization (ACO) is a metaheuristic algorithm used for combinatorial optimization problems. It is a good choice for many hard combinatorial problems because it is more efficient and produces better ...
  • Zaw, Moe Moe; Mon, Ei Ei (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Clustering is a division of data into groups of similar objects. Each group called a cluster consists of objects that are similar between themselves and dissimilar compared to objects of the other groups. Cuckoo Search ...
  • Nyo, Hnin Lai; Hlaing, Aye Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In the era of fast information interchange, video Steganography and data hiding techniques have become essential tool for information security and secret communications. Steganography is the science of embedding secret ...
  • Cho, Pyae Pyae Win; Nyunt, Thi Thi Soe (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Differential Evolution (DE) is a popular efficient population-based stochastic optimization technique for solving real-world optimization problems in various domains. In knowledge discovery and data mining, optimization-based ...
  • Nyaung, Dim En; Thein, Thin Lai Lai (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated ...
  • Thein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Keyword search is an easy and potentially effective way to find information that is stored in relational database for ordinary users or web users. As results needed by user are assembled from joining tuples of multiple ...
  • Maw, San San (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Frequent pattern mining such as association rules, clustering, and classification is one of the most central areas in the data mining research. One of the foremost processes in association rule mining is the discovering ...

Search Repository



Browse

My Account