UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Naing, Htet Htet; Aye, Zin May; Naing, Soe Kalayar (ICCA, 2021-02-25)
    Today, technology change is very fast. Security and fast processing are necessary for data transformation. The health system is related to important roles in any country for its national interest. E-health care system ...
  • Aung, Darli Myint (2012-02-28)
    Facial feature extraction is an essential step in the face detection and facial expression recognition frameworks. To develop a better facial expression recognition system, a good feature extraction method is needed. ...
  • Zaw, Sai Maung Maung; Maw, Aung Htein; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In wireless sensor networks (WSNs), energy is a very scarce resource and has to be managed wisely in order to extend the life of the sensors. Therefore, to be energy-efficient, this paper is presented as hybrid protocol ...
  • Sithu, Mya; Ishibashi, Yutaka; Fukushima, Norishige (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In this paper, we handle joint performance of a networked haptic drum system where two users play a drum set in a 3D virtual space with the same rhythm at the same tempo. In order to improve the interactivity, we propose ...
  • Lei, Wyne Lei; Ishibashi, Yutaka; Mya, Khin Than (ICCA, 2021-02-25)
    In this paper, we examine the effect of prediction control in a remote haptic control system by Quality of Experience (QoE) assessment. In the system, a user operates a haptic interface device (just called a haptic device ...
  • Nhway, Ohnmar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Nowadays, Voice over IP (VoIP) is a major and challenging task for communication technology. In this paper, we focus on VoIP which transmits voice over packet switched networks such as LANs or WANs. Adding security ...
  • Kanaishi, Kazuya; Ishibashi, Yutaka; Huang, Pingguo; Tateiwa, Yuichiro (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    By experiment, this paper investigates the effect of the stabilization control with filters to suppress instability phenomena for tele-robot systems with force feedback by using a master-slave relation. As the quality ...
  • Mung, Pau Suan; Phyu, Sabai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Healthcare big data is a collection of record of patient, hospital, doctors and medical treatment and it is so large, complex, distributed and growing so fast that this data is difficult to maintain and analyze using ...
  • Wutyi, Khaing Shwe; Thwin, Mie Mie Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Anomaly detection studies the normal behavior of the monitored system and then looks out for any difference in it to detect anomalies or attacks. It is able to detect new attacks as any attack is assumed to be different ...
  • Phyo, K-zin; Sein, Myint Myint (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Everyday a large number of human lives and properties are lost due to emergency events. When emergency case happened, there are some problems that not only the delay in calling the emergency service teams to get the ...
  • Khaing, Myo; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    A novel metric that integrates the correlation and reliability information between each feature and each class obtained from Multiple Correspondence Analysis (MCA) is currently the popular solution to score the features ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • Swe, Myo Myo; Myo, Nyein Nyein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Social networking sites have turned out to be extremely well known as of late. Most internet users utilize them to discover new companions, refreshes their current companions with their most recent feelings and thoughts. ...
  • Win, Chaw Su; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Web pages consist of both informative and non-informative content for the users. Web Page Indexing System, Web Page Classification and Clustering System and Web Information Extraction System that help the users to support ...
  • Oo, Wint War; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. The emergence of real-time applications ...
  • Su, Hla Myo; Maw, Aung Htein (ICCA, 2021-02-25)
    Video streaming exceeds all other traffic types on the internet. Now, it occupies a significant portion of total internet traffic. The transmission mechanism used by the video stream affects not only network traffic but ...
  • Aung, Thinzar; Myint, Zin Thu Thu (ICCA, 2021-02-25)
    Nowadays, many people use the internet for more than one purposes. Among these purposes, they mostly apply the web application which is one of the internet usage technologies. A web application is composed of a web server ...
  • Win, Khine Zar Ne; Myo, Khin Mar (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    The rapid growth of aspect-oriented applications increases the need to evaluate these applications. In the past, the software attributes have been tried to subjectively and objectively evaluate for the object-oriented ...
  • Aye, Hnin Mya; Zaw, Sai Maung Maung (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Action recognition has become an important research topic in the computer vision area. This paper presents an efficient action recognition approach based on salient object detection. Recently, many features were directly ...
  • Aung, Su Nandar; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Spatial keyword search on spatial database has been well studied for years due to its importance to commercial search engines.Specially, a spatial keyword query takes a user location and user-supplied keywords as ...

Search Repository



Browse

My Account