UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Sort by: Order: Results:

  • Melinamath, Bhuvaneshwari C (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper explores a computational model for Kannada nouns. This is a single tool performing analysis and generation in reverse direction. Kannada has rich morphology with inflections -vibhakti, derivations and ...
  • Aye, Kyar Nyo; Thein, Ni Lar (Tenth International Conference on Computer Applications (ICCA 2012), 2012-02-28)
    In today’s world, almost every enterprise is seeing an explosion of data. They are getting huge amount of digital data generated daily. Such huge amount of data needs to be stored for various reasons. Now the important ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the great success of web search engines, keyword search has become the most well-liked search model for users. Information retrieval systems have popularized for searching unstructured data by keywords as a query ...
  • Lin, Nu Nan Dar; Thu, Ye Kyaw; Matsumoto, Mitsuji; Urano, Yoshiyori (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The World Wide Web is an information resource with virtually unlimited potential. However, this potential is relatively untapped because locating relevant information can often be time consuming and fruitless. If ...
  • Thaing, Aye Nwe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In chemical informatics, the structure of chemical compound can be represented as graph with atoms as nodes and bonds as edges. Exact structural graph matching (automorphism), exact substructure graph matching ...
  • Win, Aye Thida (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Machine Translation (MT), one of the main problems to handle is word reordering. Myanmar Language and English language are linguistically different language pairs. Myanmar language is a verb final language and ...
  • Khaing, Cho Cho; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper makes a comparative study of the Extended Great Deluge (EGD) based hype heuristic (HH) for the university exam timetabling problem. Indeed, Hyper-Heuristic is not new in AI field. It is an emerged ...
  • Kyaw, Tin Ei (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The hazardous acoustic event classification system is presented and tested in threatening environments. The system is based on classified with Support Vector Machine (SVM), k Nearest Neighbor (kNN) and modeled with ...
  • Aung, Nyein Thwet Thwet; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents Word Sense Disambiguation for Myanmar Language. Word Sense Disambiguation (WSD) is an intermediate but an important step in Natural Language processing. WSD is defined as the task of finding the ...
  • Aung, Nay Aung; Ko, Aye Chan (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, steganography plays a critical role in Information Security. A number of steganographic algorithms have been proposed by focusing on this property of a steganographic system. It is needed two bytes to hide ...
  • Phyu, Hnin Pwint; Nyunt, Thi Thi Soe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software maintainability prediction enables organizations to predict the maintainability of the software systems and can then help in reducing the maintenance effort and thus, reducing the overall cost and time spent ...
  • Yee, Thiri The` Wut; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Smartphones are more and more gaining popularity, creating novel application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile applications ...
  • Lin, Nay Yee; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents a system for detection and suggestion English grammar errors in Myanmar-English statistical machine translation system. There are very few spelling errors in the translation output, because all words ...
  • Aye, Chan Myae (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Opinion reviews on products are used by potential customers before deciding to purchase a product. Large volumes of reviews are posted to the Internet and detection of fake reviews is now a challenging research problem. ...
  • War, Nu Nu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the increased amount of information rapidly available on the World Wide Web, Internet users that want to know opinions about products are becoming difficult to determine which product (entity) is the best on ...
  • Tun, Amy; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Digital watermarking technology is now attracting considerable attention as one of the potential solutions for protecting copyrights of digital images. In this paper, digital color image watermarking scheme based on ...
  • Htet, Thu Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting a secret communication. Hiding a message will most likely leave detectable traces in the cover medium. The information hiding process changes the statistical properties ...
  • Htun, Win Pa Pa (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Building a new document needs the preparation of required information and finding the related written parts that have already identified from existing documents. In this paper, we outline the importance of structuring ...
  • Ei, Nyein Nyein (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The labeling scheme is used to label the nodes of an XML tree. Based on the labeling scheme, XML queries can be processed without accessing the original XML document. One more important point for the labeling scheme ...

Search Repository



Browse

My Account