UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Phyu, Myat Sapal; Thant, Win Win; Zin, Thet Thet (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Lexicographic sorting is the task of arranging an unordered collection of words into increasing or decreasing order.The main objective of this paper is to develop Myanmar lexicographic sorting method in Myanmar traditional ...
  • Mon, Pann Yu; Mikami, Yoshiki (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    With the enormous growth of the World Wide Web, Search engines or Information Retrieval (IR) play a critical role in retrieving information from the borderless Web. Although many search engines are available for the ...
  • Wai, Phyo Phyo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Natural language translation is one of the most important researches carried out in the world of Artificial Intelligent. In any application where a computer has to process natural language, ambiguity is a problem. Many ...
  • Win, Yin Yin; Nwe, Tin Htar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper presents the development of bidirectional machine translation system of Myanmar- English. This Machine Translation system is based on Transfer Based Approach. It contains three stages: (1) source sentence ...
  • Win, Saw; Pa, Win Pa (ICCA, 2021-02-25)
    Myanmar language is a low-resource language as well as obtaining large-scale cleaned data for natural language processing(NLP) tasks, it is challenging and expensive with the progress in NLP. Deep learning has boosted the ...
  • Hlaing, Pa Pa (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Energy consumption of data centers has been increasing continuously due to rising demands of computational power. One promising approach of reducing this energy consumption is the consolidation of servers by virtualization. ...
  • Myint, Thida (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Name Entity Recognition (NER) is one of the fundamental problems in many Natural Language Processing applications. NE consists of names, person, location, organization, time, numerical expressions and etc. Not much ...
  • Win, May Thu; Win, Kay Thi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    A fundamental problem in image processing is image segmentation. The conventional image segmentation methods, to some extent, all suffer from the problem of inaccurate segmentation. A slightly easier and more approachable ...
  • Thu, Aye Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases ...
  • Hlaing, Thuzar; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is ...
  • Cherry, Hnin; Tateiwa, Yuichiro; Aye, Zin May (ICCA, 2021-02-25)
    There are several students who cannot understand the mechanism of communication, which is a part of TCP/IP, by taking lectures and reading textbooks. Our system helps students to understand it by observing network behavior ...
  • Oo, Thazin Myint; Thu, Ye Kyaw; Soe, Khin Mar; Supnithi, Thepchai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This work explores the first evaluation of the quality of neural machine translation between Myanmar (Burmese) and Dawei (Tavoyan). We also developed Myanmar-Dawei parallel corpus (around 9K sentences) based on the ...
  • Tun, Khin Mo Mo; Thein, Htet Thazin Tike (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. In this paper, the adaptation of network ...
  • Winn, Aung Phyo; Troyanovskyi, V.M. (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Detecting signals with hidden periodicity is a wide and popular task in most complicated technical systems. The fields, where this problem is observed, can be astrophysics, engineering and mechanics, adaptive control, ...
  • Kywe, Wyne Wyne; Murakami, Kazuhito (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Real-time system requires not only the perfect result but also the partial usable result which produces in time under time restriction. Morphological method is a tool for extracting image components that are useful in ...
  • Naing, Win Win; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, the classic technology called cloud computing is very hot topic. It is widely developed in various environments such as information technology, business and medical, etc. Cloud computing platform offers ...
  • HarmokoSaputro, Adhi; Mustafa, Mohd. Marzuki; Hussain, Aini (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A computer-based of cardiac diagnosis system is needed to assist a cardiologist to evaluate the coronary artery disease quantitatively. In this paper, a computer-based global and regional diagnosis is developed to ...
  • Aye, The` Seint; Soe, Than Naing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...

Search Repository



Browse

My Account