UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...
  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Hlaing, Pa Pa (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Data centers have become the nextgeneration computing platforms for enterprises and Internet users. This is primarily due to the economic and technical advantages of resource sharing in data centers. By sharing ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Tun, Thant Zin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, virtualization technologies become increasingly popular in enterprise and organizational networks: such as data center. In order to facilitate fault management, highavailability, load balancing and low-level ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Latt, Win Zaw; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Education is an important part of human life and it is also valuable asset for career achievement. Nowadays, people gained certificates from the institution they had learnt and, those graduation documents are presented as ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    XML (eXtensible Markup Language) and its schema language are becoming a primary data exchange format on the current web. In the next generation of the Semantic Web, the drawbacks of XML and its schema are appeared. ...
  • Nwe, San San; Kham, Nang Saing Moon (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social media has quickly become popular as an important means that people, organizations use to spread information of divert events for various purposes, ranging from business intelligence to nation security. However, the ...
  • Nwet, Khin Thandar; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper describes an alignment system that aligns Myanmar-English texts at the sentence and word level in parallel text. Sentence and word level alignment is the identification of the corresponding sentence and word ...
  • Takada, Kazuma; Nakajima, Hideharu; Sagisaka, Yoshinori (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Aiming at communicative speech synthesis, we analyzed sentence-final prosody characteristics through subjective impression on constituting lexicons. Since Japanese sentence-final particles and postpositionals are ...
  • Zaw, Wai Phyoe; Hlaing, Zar Chi Su Su (ICCA, 2021-02-25)
    Nowadays, a lot of information is valuable for people who want to predict and decide the market or economic or political or many different areas. Because of the information age, customers are also no longer interested in ...
  • Chan, Wint Nyein; Thein, Thandar (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-17)
    Nowadays, Twitter Sentiment analysis has become popular as it helps the organization to determine marketing strategy by providing public opinions. Efficient techniques to collect a large amount of Twitter stream data ...
  • Zin, Thet Thet (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Previous year, many researchers have been sentiment analysis on many focus languages. They analyzed and categorizing opinions expressed in a text. People express their opinions and feeling on social media as a daily ...
  • Khing, Wai Phyoe; Aye, Mya Mya; Tun, Hla Myo (ICCA, 2021-02-25)
    The audio signal represents sounds that may contain speech, song and all types of sounds. The audio signal processing provides many research areas such as speech recognition, audio events recognition, music information ...

Search Repository



Browse

My Account