UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • San, Cho Cho; Thwin, Mie Mie Su (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, Wireless Local Area Network (WLAN) is widely used because of mobility and ease of placement. The rapid growth in the use of wireless networks attracts the attackers as a target. Link layer is the weakness ...
  • Khaing, Phyu Phyu; Thwe, Khine Zar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The aim of this paper is to assist Buddhists and the new Buddhist students who are unfamiliar with some of the Pali words often used in the study of Buddhism. Moreover this can also assist the students of philosophy ...
  • Latt, Tin Myo; Thida, Aye (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural language processing is normally used to describe the function of computer system which analyze or synthesize spoken or written language. One area of Natural language processing is concerned with creating proofing ...
  • Win, Su Su; Thwin, Mie Mie Su (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To ...
  • Yu, Thanda Tin; Lynn, Khin Thidar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Apriori is an algorithm for frequent item set mining and association rule mining over transactional databases. It proceeds by identifying the frequent individual items in the database and extending them to larger and larger ...
  • Naing, Phone; Oo, Kyaw Zin; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Today’s Cryptographic Methods are based on Mathematical ideas and its complexity. Quantum Computers are getting increasing attention because of the tremendous power by harnessing the unique properties of Quantum Physics. ...
  • Kyaw, Aye Aye; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    oftware testing is an activity of finding defects during execution time for a program so that nondefect software can be got. Software testing plays a vital role in developing software that is free from bugs and defects. ...
  • Thu, Pyae Phyo; Win, Htwe Nu (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The term virtual phone conversation system refers to the bidirectional Myanmar to Myanmar Speech-to-Text and Text-to-Speech translation system that runs in real-time on the mobile phones. With the used of Real-time ...
  • Thu, Pyae Phyo; Lynn, Khin Thida (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Bioinformatics is the study and application of computational methods to life sciences data and the application of information technology to store, organize and analyze the vast amount of biological data. Protein sequence ...
  • Swe, Minn; Das, Partha Pratim; Htay, Myat Thet Lyar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Optimization is ubiquitous, from industry to engineering design, from scheduling your daily routine to your holiday. In many large organizations, from governments to private companies, management of transferring staffs ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud computing is an emerging computing paradigm in which applications, data and IT resources are provided as a service to users over the Internet. One kind of services that can be offered through the cloud is Software ...
  • Zar, Myat Thu; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Building public route transportation system is the key technology for urban areas. Most of citizens in Yangon area make use of public transportation such as bus, taxi, rail and so on. In this system, A* algorithm is used ...
  • Mon, Ohnmar Min; Mon, Myat Thida (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The next generation Internet demand for high quality of service (QoS) guarantees to deliver different applications for end users. Quality of Service (QoS) is difficult to guarantee the performance requirements for various ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Ranking is a crucial part of information retrieval. Queries describe the users’ search intent and therefore they play an essential role in the context of ranking for information retrieval. The diverse feature impacts ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’ ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’queries ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The Semantic Web, which represents a web of knowledge, offers us new opportunities to search for knowledge and information. To harvest such search power requires robust and scalable data repositories that can store RDF ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In information retrieval, the users’ queries often vary a lot from one to another. Most IR systems use a single fixed ranking strategy to support the information seeking task of all users for all queries irrespective ...
  • Kyaw, Myat Myitzu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Due to the fast growth of online information on the Internet, there are a large number of journals, magazines, information portals and personal blog sites written in Myanmar language have now online editions. But there ...

Search Repository



Browse

My Account