UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Title

Browsing International Conference on Computer Applications (ICCA) by Title

Sort by: Order: Results:

  • Win, Myat Su; Khin, Thet Thet (ICCA, 2021-02-25)
    Essential role of Internet-based communication is the security of information. Classical Cryptography is based on mathematical models and computational complexity to compute the secret key. It does not provide enough ...
  • Aung, Yi Yi; Min, Myat Myat (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology ...
  • Maw, Myint Myint; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Refactoring is the process of restructuring existing computer code – changing the factoring – without changing its external behavior. It is a common approach to producing better quality software. However, its impact ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...
  • Aung, Hay Mar Su; Pa, Win Pa (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    This paper presents a study of comparison on three different machine learning techniques to sentiment analysis for Myanmar language. The fundamental part of sentiment analysis (SA) is to extract and identify the ...
  • Soe, Ei Phyu Phyu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Speech synthesis system is a popular field in natural language processing of computer science for various languages. The process of speech synthesis is to produce the human-like speech from corresponding language and ...
  • Tun, Kyaw Naing; Aye, Zin May; Khaing, Kyaw Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The number of applications for smart mobile devices is steadily growing with the continuous increase in the utilization of these devices. the Installation of malicious applications on smart devices often arises the ...
  • Htun, Myo Thet (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Audio fingerprinting is a smart technology to identify music contents relevant to the query by comparing the content-based hash (fingerprint) of the query to known hashes in the fingerprint database. For a million-song ...
  • Aung, Su Wit Yi; Khaing, Soe Soe (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Land use and land cover change has become a vital component in current strategies for managing natural resources and monitoring environmental changes. Analyzing the changing of hydrological area, vegetation area and ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing paradigm contains many shared resources such as infrastructures, data storage, various platforms and software. In cloud storage service, consistency not only influences the performance and availability ...
  • Myo, Zin Mar; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Long Term Evolution (LTE) is a mobile network that operates completely in packet domain. Due to the variation of radio condition in LTE, the obtainable bit rate for active users will vary. The two factors for radio ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data Centre (DC) administrators try to delivering performance guarantees while managing resources for utilization in terms of reducing cost. With the advent of server consolidation provided by virtualization technology, ...
  • Htun, Phyu Thi; Win, Mya Thidar Myo; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many Intrusion Detection System (IDS) based on signatures. If a new attacks, which by definition cannot be in the database of signatures is coming, those system cannot detect. The attackers will have a new way ...
  • Win, Mya Thidar Myo; Htun, Phyu Thi; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. Current ...
  • Aung, Khin Zezawar; Myo, Nyein Nyein (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    Opinion mining, which is also known as Sentiment Analysis, is an interesting field to analyze people’s opinions, sentiments, attitudes and appraisals. There are several approaches to analyze the textual data using sentiment ...
  • Wai, Khaing Phyo; Thu, Ei Ei (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Social network analysis (SNA) is the study of social networks to understand their structure and behavior. The study of the social networks is the possibility of collecting web log data. The data used for analyzing ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    The android speech recognizer acquires speech at run time through a microphone and processes the sampled speech to recognize the uttered text. But the output texts do not match with users’ data because English and ...
  • Cuong, Nguyen Phu; Nedev, Zhivko; Tin, Duong Trung; Tu, Le Anh (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    We describe the design and implementation of a computer application that can search for a small size balanced set modulo p, with p prime. Additionally, the application can”analyze” and ”visualize” any given balanced set ...
  • Soe, Yan Naung; Oo, Khine Khine (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Mobile devices have gained tremendous popularity over the last few years. The most popular usage is the smart phones. They are accepted and admired by many mainly because they are capable of providing services such as ...
  • Yu, Thein; Nwet, Khin Thandar (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    This paper presents a corpus of Myanmar News and its metadata, annotated with sentiment polarity. It contains 100 news from Myanmar media websites such as news-eleven.com, 7daydaily.com and popularmyanmar.com. This news ...

Search Repository



Browse

My Account