UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Min, Aye; Kyu, Zin Mar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    With advanced imaging techniques, Magnetic Resonance Imaging (MRI) plays an important role in medical environments to create high quality images contained in the human organs. In the processing of medical images, medical ...
  • Myint, Aung Zaw; Tun, Khin Mo Mo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Web-based geographic information search engines are prominently used in recent years. Spatial databases have both spatial and textual descriptions. Geographic web search engine retrieves the nearest objects that are ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A relational database is often operated by means of a structured query language (SQL). When composing SQL-queries one must have an understanding of the SQL syntax to be able to produce a query the database can ...
  • Myint, Aye Aye; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Land cover/use change detection is an important component for better understanding the interactions of the human activities with the environment and necessary to simulate environmental changes. This study investigates land ...
  • Zaw, Hnin Thiri; Maw, Aung Htein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long-lived large flows. Moreover, it can lead to low network throughput and high network ...
  • Gruenwald, Hermann (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper focuses on the large scale implementation of information systems in ASEAN. We use the complexity of the Hospital Information System (HIS) to gather lessons learned from a stakeholders’ perspective through ...
  • Phyue, Soe Lai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The lexical analysis within the context of language processing is to connect each word with its corresponding label in a lexicon. However, many words have more than one meaning, ambiguity word, which may make it impossible ...
  • Myint, Phyu Hninn; Htwe, Tin Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Part-of-speech (POS) tagging is the process of assigning the part-of-speech tag or other lexical class marker to each and every word in a sentence. In many Natural Language Processing (NLP) applications such as word ...
  • Nyein, May Kyi; Soe, Khin Mar (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Reordering is extremely desirable for translation accuracy when translating between high disparity language pairs in word order. The aim of this paper is the comparative study of lexicalized reordering models (LRM) by ...
  • Aung, Khin Zezawar; Myo, Nyein Nyein (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Sentiment analysis is used to determine sentiments, emotions and attitude of user. In educational evaluation, sentiment analysis is implemented in teaching evaluation in order to explore the answers obtained from ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the advent of virtualization technology, multiple heterogeneous virtual machines (VMs) can be coexisted on a physical server. Dynamic allocation of server’s resources prevents over provisioning and under provisioning ...
  • Ohsawa, Yutaka; Hlaing, Aye Thida (Twelfth International Conference On Computer Application (ICCA 2014), 2014-02-17)
    This paper proposes a shortest path search algorithm based on materialized-path-view constructed only on partitioned subgraphs, and its three variations referring different levels of distance materialization. A road ...
  • Myint, Khin Swe Swe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Virtualization can provide significant benefits in data centers by eliminating overload nodes. An increasing workload can be handled by allocating the resources to a virtual server and storage, if idle resources are ...
  • Myint, Khin Swe Swe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Virtualization techniques provide the carving individual physical servers into multiple virtual containers that can be run and managed separately. However, due to the uncertainty of workload variation, the workloads ...
  • Aung, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases ...
  • Aung, Ohnmar; Thein, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases (middle ...
  • Aung, Nay Win; Thein, Thin Lai Lai (ICCA, 2021-02-25)
    In order to reduce the risks related to the expressway vehicle accidents, it is considered that the timely hazard information and the prompt rescue operations are the vital elements to save the victims and users of the ...
  • Thu, Myint; Sein, Myint Myint (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    With the development of mobile Internet, more and more people begin to get convenient service by mobile phones. Obtaining one's current location by GPS positioning or network positioning has become one of the important ...
  • Zin, Wai Wai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to advances in technologies, most of the information is kept electronically. Steganography and Cryptography are two popular ways of sending vital information in a secret way. In this paper, an image steganography ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...

Search Repository



Browse

My Account