UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Author "Khine, May Aye"

Browsing International Conference on Computer Applications (ICCA) by Author "Khine, May Aye"

Sort by: Order: Results:

  • Hlaing, Zar Chi Su Su; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Traveling salesman problem (TSP) is one of the most famous combinatorial optimization (CO) problems, which has wide application background. Ant Colony Optimization (ACO) is a heuristic algorithm which has been proven ...
  • Maw, Soe Yu; Khine, May Aye (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Big social data analytics is an important tool which can be used to reveal the important insight of the information from the social user. It is an approach which combines various statistical methods, sentiment analysis, ...
  • Tun, Zin Mar; Khine, May Aye (ICCA, 2021-02-25)
    Electrocardiogram (ECG) is a widely-used for the diagnosis of heart disease and the cardiac arrhythmia classification for an efficient clinical approach. The ECG has the random signal nature. Thus, acquiring the accurate ...
  • Yin, Khin Swe; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    As companies in every industry sector around the globe have lost, stolen or leaked their sensitive data to the outside world every year, the security of confidential information is increasingly important. Remote Access ...
  • Hlaing, Thuzar; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    To avoid high computational costs in identifying intrusions by IDSs, the size of a dataset needs to be reduced. Feature selection is considered a problem of global combinatorial optimization in machine learning, which ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Ant Colony Optimization (ACO) is a metaheuristic algorithm used for combinatorial optimization problems. It is a good choice for many hard combinatorial problems because it is more efficient and produces better ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Tun, A Me; Khine, May Aye (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Most of the countries around the Bay of Bengal are threatened by storm surges associated with severe tropical cyclones. The destruction along the coastal regions of India, Bangladesh, and Myanmar are serious due to the ...
  • Hlaing, Thuzar; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is ...
  • Win, Eaint Mon; Khine, May Aye (ICCA, 2021-02-25)
    The study of real networks like social network has been increasingly interested in community research area. With this study, overlapping community detection plays an important role in studying hidden structure of those ...
  • Thandar, Aye Mya; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In artificial neural networks, the parameters may include the number of layers, the number of hidden units, the activation function and the algorithm parameters such as learning rate for optimization. Many researchers ...
  • Mon, Myat Myat; Khine, May Aye (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Cloud computing is an interested and big developing computing technology that maintain data servers and service huge applications to provide end users in many different organization. Although cloud computing gives many ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In today digital age, there are more demands to improve techniques for information security. One of the solutions is steganography, hiding sensitive information within innocentlooking cover media. In this paper, we ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...

Search Repository



Browse

My Account