UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Gray, Heather (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Integrating the use of Facebook to support student learning and improve student success, is a challenge academics are currently facing. While this may not be crucial in an in-person setting, for students who are studying ...
  • Aung, Darli Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The facial expression recognition system has been a significant field in human-computer interaction. It is a considerably challenging field to generate an intelligent computer that is able to identify and understand ...
  • Finch, Andrew; Thu, Ye Kyaw; Tamura, kihiro; Sumita, Eiichiro; Sagisaka, Yoshinori (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Factored machine translation models extend traditionalPhrase Based Statistical Machine Translation (PB-SMT) by taking into account notonly the surface form of the words, but also linguistic knowledge such as the ...
  • Win, Zin Mar; Aye, Nyein (Thirteenth International Conference On Computer Applications (ICCA 2015), 2015-02-05)
    The explosion of Image spam emails has prompted the development of numerous spam filtering techniques. This paper proposes an efficient image spam filtering system using three methods. The first method, File ...
  • Zaw, Win; Min, Hla Yin (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Wireless sensor network (WSN) are becoming more attractive due to the low cost deployment, small size, low energy consumption and simple operation. Sensors energy cannot support long haul communication as changing energy ...
  • Tun, Thant Zin (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Virtualization is a key piece of modern data center design. Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance. A replication mechanism is proposed to provide ...
  • Naing, Win Win; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing provides access to large pool of data, applications and computational resources. Many researchers have been proposed several open-source Infrastructure-asa-Service (IaaS) cloud management frameworks (e.g, ...
  • Aung, Ni Htwe; Thu, Ye Kyaw; Maung, Su Su (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Deaf people use Sign Language and Fingerspelling as a fundamental communication method. Fingerspelling or manual spelling is a method of spelling words using hand movements, and most often used to spell out names of ...
  • Kyaw, May Thu; Kham, Nang Saing Moon (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Today, mobile devices have become a widely used for personal and business purposes. Because of the popularity of mobile application, inexpensive ways for people to communicate and share information, they become the ...
  • Thein, Khant Kyaw Kyawt; Sein, Myint Myint (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    This paper handles a robust method to handle matching problem of the 3D building from remote sensed images, where two or more images are captured from the different views without any camera information. The system is ...
  • Phu, Kay Thinzar; Oo, Lwin Lwin (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    The reliable traffic sign detection provides to achieve performance in traffic sign recognition. Features representation is an important factor for TSDR system. The purpose of this research is to propose an adaptive threshold ...
  • Saw, Thinzar; Win, Si Si Mar (ICCA, 2021-02-25)
    Features are the most important things and huge influence on machine learning models. The removing of noisy and irrelevant features causes to increase the efficiency and accuracy of the model. The recent increase in feature ...
  • Hlaing, Thuzar; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    To avoid high computational costs in identifying intrusions by IDSs, the size of a dataset needs to be reduced. Feature selection is considered a problem of global combinatorial optimization in machine learning, which ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    With the enormous growth of computer networks, network security is gaining increasing importance. Therefore, the role of Intrusion Detection Systems (IDSs) is becoming more important. There are many techniques ...
  • Hein, Chit La Pyae Myo; Myo, Khin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Mobile malware performs malicious activities like stealing private information, sending message SMS, reading contacts can harm by exploiting data. Malware spreads around the world infects not only ends users applications ...
  • Nyaung, Dim En (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    One of the important types of information on the Web is the opinions expressed in the user generated content, e.g., customer reviews of products, forum posts, and blogs. Customer reviews of products are focused in this ...
  • Thein, Thin Lai Lai; Nyaung, Dim En (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, online customer reviews become a significant informative resource due to the rapid development of web. In a webpage, the reviews are written in natural language and are unstructuredfree- texts scheme. To ...
  • Soe, Nwe Nwe; Htay, Win (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    This paper offers finding the region of interest and automatic cropping from palm leaf manuscripts developed by using one-dimensional segmentation. This system can be used to provide for enhancing palm leaf manuscripts ...
  • Htun, Nyi Nyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents a method based on receptor model for finding the shortest smooth path in variable size with safety margin, where clothoid curvature is used for smoothing path. The method modifies the results of grid-based ...
  • Htwe, Khin Sabai; Aye, Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    In this paper, a Region of Interest (ROI) extraction method is proposed based on labeling vein images using morphological processing. Firstly, finger vein images are segmented to remove the unwanted background or the ...

Search Repository



Browse

My Account