UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Kyaw, May Thu; Kham, Nang Saing Moon (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The increasing popularity of smartphones and tablets has introduced Android malware which is rapidly becoming a potential threat to users. A recent report indicates the alarming growth rate of Android malware in which ...
  • Aung, Swe Swe; Khaing, Kyawt Yin; Aung, May Phyo; Phyo, Nang Wai Wai; Aung, Darli Mying; Naing, Thinn Thu (ICCA, 2021-02-25)
    Digital contact tracing is one of supportive tools for the prevention and reduction of wide spread of the covid-19 virus. Machine learning is one of the most supportive approaches for contact tracing applications. Thus, ...
  • Yi, Htay Htay; Aye, Zin May (ICCA, 2021-02-25)
    Today, malicious users are widespread and are frequently lengthening worldwide. So, network security becomes crucial in the domain of education, government, business, and other sectors with related network connections. The ...
  • Khaing, Myint Soe; Aye, Zin May; Tun, Thazin (ICCA, 2021-02-25)
    Internet of Things(IoT) security is one of the main issues when executing and creating IoT platforms. The significant increment of the IoT devices in smart homes and other smart infrastructure make numerous attacks on these ...
  • Htwe, Chaw Su; Thwin, Mie Mie Su; Thant, Yee Mon (ICCA, 2021-02-25)
    The malware attacks are targeting IoT devices as the rapid development of these devices. The limited resource of IoT devices is attracting malware developers. The strong security mechanisms cannot be deployed on these ...
  • Oladipupo, Bilesanmi Yusuf; Thu, Ye Kyaw; Yoshiyori, Urano (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In recent years, the smart grid has occupied the area of power and grid management research and indeed a lot of brilliant works have been done. Nevertheless, most of these works have been designed only for the improvement ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The Semantic Web has been developed in order to publish and access a lot of information for automatically processing of data and information by machines rather than for people. RDF (Resource Description Framework) data ...
  • Htet, Khaing Suu; Sein, Myint Myint (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Nowadays, understanding demographic information on social influencer events is important for target customer analysis. Hence monitoring the crowded event requires an intelligent sophisticated technology with human ...
  • Lin, Khin Saw (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper presents a simple and efficient approach for predicting the dynamic behavior of the sucker rod string. The dynamic behavior of the sucker rod string is an important factor for predicting the performance of a ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Yamada, Hiroshi (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    The characteristics of Lithium Ion Capacitor (below , abbreviated as LIC) as a charging device is similar to Lithium Ion Battery and has quite long life, it is 100 times more than Lithium Ion Battery charge and ...
  • Thaw, Tin Zar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The eXtensible Markup Language (XML) based web applications are used for data representing, exchanging and storing via internet by the usage of XML standard schema. If XML schema files are difficult to understand ...
  • Khin, Ei Ei; Phyu, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    A mobile ad-hoc network (MANET) is an autonomous wireless system which consists of several mobile nodes to form an arbitrary and temporary network. As the lack of infrastructure network, MANETs are facing various severe ...
  • War, Nu; Lwin, Zin Mar (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Electroencephalogram (EEG) signal is an important source of information for knowing brain processes. To interpret the brain activity, Matching Pursuit Based EEG signal classification is proposed. This system includes three ...
  • Wai, Khin Su Su; Myint, Julia; Yee, Tin Tin (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Hadoop distributed file system (HDFS) was originally designed for large files. HDFS stores each small file as one separate block although the size of several small files is lesser than the size of block size. Therefore, ...
  • Zan, Thu Thu; Phyu, Sabai (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Natural disaster cannot be prevented, but its impacts can be eliminated or reduced. Mobile devices are the most effective and convenient communication tools which are not restricted by time and place. In this paper, ...
  • Khine, Saw Thazin; Myo, Win Win (ICCA, 2021-02-25)
    Customer churns prediction is a major concern for banking industries all over the world, and market development is happening a more considerable task, and a more important challenge is taking place in business growth. The ...
  • Maw, Tin Win; Zaw, Myo Hein (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today’s world is experiencing many natural disasters like earthquakes, flooding, Tsunamis and forest firing, etc. Therefore, it is not only necessary to use widely Wireless Sensor Networks in the hostile environments all ...
  • Maung, Saw Zay Maung; Aye, Nyein (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Recognizing text image from mobile phone is a challenge task for limited capacity and processing power. And also the accuracy of the system is important for text image recognition system. In this system, we aimed to ...
  • Soe, Wunna (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent advances in web and mobile computing technologies provide users with a vast amount of information and services such as online news, weather forecasting news, shopping, banking, music, movies, and online games. The ...

Search Repository



Browse

My Account