UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Sort by: Order: Results:

  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Ranking is a crucial part of information retrieval. Queries describe the users’ search intent and therefore they play an essential role in the context of ranking for information retrieval. The diverse feature impacts ...
  • Thandar, Aye Mya; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In artificial neural networks, the parameters may include the number of layers, the number of hidden units, the activation function and the algorithm parameters such as learning rate for optimization. Many researchers ...
  • Thant, Win Win; Htwe, Tin Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This article investigates the use of transformation-based learning for resolving function tagging ambiguity in the Myanmar language. Function tagger plays an important role in natural language applications like ...
  • Murthy, Kavi Narayana; Badugu, Srinivasu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In this paper we analyze the need for Roman Transliteration for Indic scripts. We evaluate the pros and cons of various schemes in use today and argue for a scientifically designed standard scheme. We offer one such ...
  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Nwet, Khin Thandar; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper describes an alignment system that aligns Myanmar-English texts at the sentence and word level in parallel text. Sentence and word level alignment is the identification of the corresponding sentence and word ...
  • Myint, Cynthia (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents a simple rule-based POS tagger to tag the correct syntactic categories of the Myanmar words by applying lexicon based word segmentation and heuristic rule based tagging method. Firstly, input sentence ...
  • Capretz, Luiz Fernando (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software is a word with a fuzzy perception. People who talk about software may be thinking about the structure of a program, the functionality of an application system, the look and feel of an interface or the overall user ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...
  • Kyaw, Win Thuzar; Thein, Ni Lar; Htay, Hla Hla (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    By providing information as the summary, the reader can save time and can easily absorb the main concepts of the articles which are described in digital form. Therefore, automatic text summarization, the process of ...
  • Nyo, Aye Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Many cryptographic protocols require random or pseudorandom inputs at various points (e.g., for generating digital signatures, or in some authentication protocols). Pseudorandom numbers are critical part of modern ...
  • Kyi, Hsu Mon; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is deployed a large set of virtualized computing resources in different infrastructures and various development platforms. One of the key challenges in cloud computing system is virtual resources and ...
  • Mar, Yi Yi; Maw, Aung Htein; Nwe, Khine Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Query processing is an essential role in large scale distributed network application environment including database indexing, distributed computing, location aware services and network monitoring system. In order to ...
  • Soe, The` The` (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the application of Natural Language Processing (NLP), phrase identification is one of the important roles for machine translation system. This paper proposed Myanmar Verb Phrase identification Algorithm and Morphological ...
  • Aye, Tin Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The explosion of data , its criticality , and business and education ‘s growing dependency on digital information are leading to larger and more complex information storage environments that increasingly combating to ...
  • Soe, Ei Phyu Phyu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Myanmar texts are different from English texts in that they have no spaces to mark the boundaries of words. So, Myanmar word segmentation is a difficult. The processing of Myanmar text is complicated by the fact that ...
  • Zaw, Ei Phyu; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Live virtual machine (VM) migration provides great benefits for load balancing, power management, fault tolerance and other system maintenance issues in modern data centers. VM live migration basically consists ...
  • Thet, Yi Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Finding all occurrences of a twig pattern query is a core operation of XML query processing system. Many algorithms have been proposed. Existing algorithms generate individual path matches and then stitch them together ...

Search Repository



Browse

My Account