UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Thazin, Nwe; Nwe, Khine Moe; Ishibashi, Yutaka (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Cloud Data Center Network (CDCN) is receiving considerable attention and becomes one of the hottest topics among academia and industry. It is difficult to deliver the new emerging network services in a flexible way and ...
  • Sithu, Mya; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, a three level resource management system for virtualized data center is presented. Three levels are defined as vitrual machine level controller (VLC), host level controller (HLC) and central level ...
  • Myint, Khin Swe Swe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data centre virtualization creates an agile environment for application deployment. Applications run within one or more virtual machines and are hosted on various servers throughout the data centre. It improves resource ...
  • Htwe, Thandar Su Nge (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Load-balancing problems arise in many applications, but, most importantly, they play a special role in the operation of parallel and distributed computing system. Scheduling in distributed operating systems has a ...
  • Phyu, Mon Myat; Khine, Myat Thiri (ICCA, 2021-02-25)
    Demand forecasting is crucial for a retail business as it can greatly affect everything ranging from promotion, pricing, product assortment and inventory. Building a reliable and useful demand forecasting model is still a ...
  • Phyu, Hnin Pwint; Nyunt, Thi Thi Soe (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In maintenance of object-oriented software, one of the most important concepts is inheritance, which organizes classes into a hierarchy. The relationships among packages, classes, access modifiers, inherited classes ...
  • Win, Tin Nilar; Htoo, Htoo; Ohsawa, Yutaka (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper proposed a reverse k nearest neighbor (RkNN) query algorithm in road network distance by using the simple materialization path view (SMPV) data structure.When a set of interest objects P and a query point q ...
  • Aye, Chan Myae (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Assessing the trustworthiness of reviews is a key issue for the maintainers of opinion such as Amazon.com. Opinion reviews on products and services are used by potential customers before deciding to purchase a product. ...
  • Thu, Ye Kyaw; Takabuchi, Kenta; Fukai, Kaisei; Iwahashi, Naoto; Kunishima, Takeo (Fifteenth International Conference on Computer Applications (ICCA 2017), 2017-02-16)
    Language acquisition for robot is a challenging topic in the artificial intelligence research area and essential for natural communication between robot and human. In this paper, we proposed language acquisition ...
  • Su, Ei Thin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper managed to propose robust audio data hiding through optimization-based problem transformation method, Probabilistic Global Search Lausanne Algorithm (PGSL) in modified discrete cosine transform (MDCT) ...
  • Yin, Su Su; Nwe, Khine Moe (ICCA, 2021-02-25)
    During the Corona virus pandemic, we should change for learning classroom system to distance learning (online learning) system. Online learning management system is so flexibility for teaching and learning environment. ...
  • Murthy, Kavi Narayana; Badugu, Srinivasu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In this paper we analyze the need for Roman Transliteration for Indic scripts. We evaluate the pros and cons of various schemes in use today and argue for a scientifically designed standard scheme. We offer one such ...
  • Aung, Thet Thet; Nyunt, Thi Thi Soe (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Many system of interest in sciences can be represented as network (social network, biological network, computer science and etc), sets of nodes joined in pairs by edges. Detecting community structure is become one of the ...
  • Myint, Julia; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The need and use of scalable storage on cloud has rapidly increased in last few years. Organizations need large amount of storage for their operational data and backups. To address this need, high performance storage ...
  • Zin, Wai Wai; Soe, Than Naing (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The network security is very important for data transmission on the internet and security threat is very important challenges in any communication system. This security of information can be achieved by using encryption and ...
  • Mon, Myat Myat; Khine, May Aye (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Cloud computing is an interested and big developing computing technology that maintain data servers and service huge applications to provide end users in many different organization. Although cloud computing gives many ...
  • Kyaw, Lett Yi; Phyu, Sabai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Parallel and distributed computing is a research area that is complex and rapidly evolving. Researchers are trying to get more and more methods and technologies in parallel and distributed computing. Most users who use ...
  • Oo, Mie Khine; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Under the explosive increase of global data, the term Big data is mainly used to describe enormous datasets. With the availability of increasingly large quantities of digital information, it is becoming more difficult ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only end users applications ...
  • Yar, Kay Thi; Tun, Khin Mar Lar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for ...

Search Repository



Browse

My Account