UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Lynn, Nay Chi; Aung, Su Su (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Making use of search engines is most popular Internet task apart from email. Currently, all major search engines employ web crawlers because effective web crawling is a key to the success of modern search engines. Web ...
  • Mon, Ei Ei; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electronic mail is used daily by millions of people to communicate around the world and it is a critical application for many businesses. Because of the fame of emails, the attackers utilize it to gather the sensitive data. ...
  • Lin, Nu Nan Dar; Thu, Ye Kyaw; Matsumoto, Mitsuji; Urano, Yoshiyori (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, Ontology is becoming increasingly widespread in research field and application area of computer science. Ontology is used not only in semantic web but also in database and applications that need to share domain ...
  • Aung, Yi Yi; Thu, Ei Ei (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The World Wide Web (WWW) is a rich source of information and continues to expand in size. The complexity at the WWW makes it difficult for data mining. Before the Web, finding information meant asking a friend or an ...
  • Wai, Khaing Phyo; Aung, Yi Yi (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Web log data or click stream data has a lot of valuable information about a web site or web site visitors’ online behavior. Web usage analysis or web log mining is the process of capturing, analyzing and modeling the ...
  • Thu, Ye Kyaw; Pa, Win Pa; Finch, Andrew; Hlaing, Aye Mya; Naing, Hay Mar Soe; Sumita, Eiichiro; Hori, Chiori (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Grapheme-to-Phoneme (G2P) conversion is a necessary step for speech synthesis and speech recognition. This paper addresses the problem of grapheme to phoneme conversion for the Myanmar language. In our method, we propose ...
  • Sin, Yi Mon Shwe; Soe, Khin Mar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The paper presents the first large scale evaluation of the quality of Syllable-based Neural Machine Translation (Syllable-NMT) system for Myanmar-English pair. Neural Machine Translation (NMT) system has reached ...
  • Soe, Nwe Nwe; Htay, Win (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Historical handwritten palm leaf manuscripts are very informative documents from which we can learn precious and various experiences from them. This paper presents the character segmentations of historical handwriting from ...
  • Thant, Win Win; Htwe, Tin Myat; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The task of identifying syntactic components is one of the fundamental tasks in natural language processing. The syntactic structure of every language is organized in terms of subject, object, and other grammatical ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In today digital age, there are more demands to improve techniques for information security. One of the solutions is steganography, hiding sensitive information within innocentlooking cover media. In this paper, we ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...
  • UCSY (University of Computer Studies, Yangon, 2017-02)
    Presents the table of contents page of the proceedings of the 15th International Conference on Computer Applications 2017
  • Aung, Win Win (ICCA, 2021-02-25)
    As the increasing trend of today’s education, teaching/learning opportunities for students have also increased a lot. The Technology Acceptance Model (TAM) is used to predict the user (students) satisfaction in the modern ...
  • Kyaw, Win Thuzar; Thein, Ni Lar; Htay, Hla Hla (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    By providing information as the summary, the reader can save time and can easily absorb the main concepts of the articles which are described in digital form. Therefore, automatic text summarization, the process of ...
  • Maung, Hsu Mon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web application testing is crucial to provide reliable services for the fast growing demand on web application. Testing, designing and generating test cases are challenging task because web application is complex and ...
  • Maung, Hsu Mon; Win, Kay Thi (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Web application testing has been used in finding various faults in order to improve the quality of reliable web services. Among test cases generation approaches, user session based testing is an approach to create test ...
  • Kyaw, Aye Aye; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Software testing is an activity of finding defects during execution time for a program to get non-defect software. Software testing plays a vital role in developing software that is free from bugs and defects. Manual ...
  • Myint, Theint Zarni (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    Speech recognition reduces the overhead caused by alternate communication methods. Speech has not been used much in the field of electronics and computers due to the complexity and variety of speech signals and sounds. ...
  • Maung, Su Su; Aung, Nyein Myint Myint (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents the text block segmentation for image search system.Web pages are segmented into blocks for getting the text with images. Text block with images are later used as captions of images and hence plays an ...
  • Zaw, Kyi Pyar; War, Nu (ICCA, 2021-02-25)
    Text extraction and character recognition are the computer vision tasks which became important after smart phones with good camera. Character recognition from scene text images is still challenging area, because the camera ...

Search Repository



Browse

My Account