UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Win, Ngu Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Mon, Cho Thet; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Software quality metric for PHP is scarce in literature. This paper presents a technical and research overview of software quality assessment especially for software complexity to establish a software quality observatory ...
  • Maung, Thiri; Thein, Thin Lai Lai (ICCA, 2021-02-25)
    Myanmar is exposed to almost all types of natural hazards. Drought is a slow onset hazard type. The central dry zone in Myanmar is the most vulnerable area of the country from drought. The frequency and severity of drought ...
  • Wah, Naw Lay (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Internet websites are promising as the products for providing services. The key issues related to website engineering are very essential. These websites need to measure and evaluate for quality and for better understanding. ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (2014-02-17)
    The high values of vehicles, the inadequate infrastructure cause traffic congestion. Congested roads can be avoided by determining the travel-time for a particular road ahead of time. Traffic prediction and travel time ...
  • Thinzar, Cho; Aye, Nyein (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    In the field of natural disaster management, storm detection, forecasting the weather condition and change detection are occupied as essential role. The storm direction detection is provided to manage and to prevent ...
  • Thinzar, Cho; Aye, Nyein (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    In the field of natural disaster management, storm detection, forecasting the weather condition and change detection are occupied as essential role. The storm direction detection is provided to manage and to prevent ...
  • Myint, San Hlaing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualized server environment, various services are revealed to high rates of incoming requests. The servers may become overloaded during temporary traffic peaks when more requests arrive than the server is considered ...
  • Maung, Tin; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents system architecture of a Context and Preference-Aware Location-based Services system (CPALBS, for short), that delivers personalized services to its customers based on the user preference query. ...
  • Thant, Win Win; Khaing, Sandar; Mon, Ei Ei (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Over the years, social media sites have become an important role of communication and a source of the tremendous amount of real-time data of images, videos, etc. YouTube is likely the most popular of them, with millions ...
  • Myat, Soe Myint; Soe, Than Naing (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    An effective IT solution is required for the administrative processes which is the core of university. The tamper resistance, transparency and auditability for university management data are very important to avoid the ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Preventive maintenance combined with disaster recovery planning will help to minimize the hardware and software problems if disaster occurs. Disaster recovery processes involve unplanned interruption of services. ...
  • Thein, Yadana; Htike, Theingi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar printed character s . This paper involves three important ...
  • Mon, Ei Ei; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is one of today’s most attractive technology areas due to its many advantages like Highly scalable, on-demand, web-accessed IT resources with major cost / cash and flexibility. In this paper, the ...
  • Htoo, Chit Kyin; Sein, Myint Myint (ICCA, 2021-02-25)
    Fall is a critical danger for a person because he/she can loss any recontroled and stable posture and can face to any associated injuries without any caregiver. Therefore, automatic fall recognition systems have been ...
  • Lwin, Khin Moh Moh (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software failures are now known to be a dominant source of system outages. The cost of unplanned outages is higher than the cost of planned outages. Software systems often experience aging related defects which ...
  • Paing, Aye Myat Myat; Lwin, Khin Moh Moh; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The availability of IT infrastructures is still a huge challenge nowadays. As server virtualization is used as an essential software infrastructure of various software services in IT environment and it is emerging as ...
  • Thida, Aye; Shwe, Thanda (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    With the increasing popularity and adoption of IoT technology, fog computing has been used as an advancement to cloud computing. Although trust management issues in cloud have been addressed, there are still very few ...
  • Nakajima, Hideharu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Corpora must be developed for realizing statistical language models; however, it is labor-intensive work and is very expensive. Often corpora resources are scant for such a domain as new language, new task, and new ...
  • Maung, Tin Maung; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The rapid increase of ICT creates new attack surfaces for cybercrime forensics. In society, information is the new challenge for security, privacy, and cybercrime. In this paper, an applicable framework has been proposed ...

Search Repository



Browse

My Account