UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Issue Date

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Issue Date

Sort by: Order: Results:

  • Thant, Phyo Thandar; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data storage management plays a vital role in cloud computing environment. The researchers are still trying to make the cloud data storage system to be more mature. And there are two major requirements of datastores ...
  • Hlaing, Thuzar; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is ...
  • Tin, Hlaing May (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Recently, most IT organizations are transforming their data centers to smaller virtualized ones with the help of server virtualization. In virtualized servers, multiple applications are consolidated into a physical server ...
  • Thant, Win Win; Htwe, Tin Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This article investigates the use of transformation-based learning for resolving function tagging ambiguity in the Myanmar language. Function tagger plays an important role in natural language applications like ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...
  • Htet, Thu Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting a secret communication. Hiding a message will most likely leave detectable traces in the cover medium. The information hiding process changes the statistical properties ...
  • Thet, Yi Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Finding all occurrences of a twig pattern query is a core operation of XML query processing system. Many algorithms have been proposed. Existing algorithms generate individual path matches and then stitch them together ...
  • Aung, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Semantic Web is an extension of the current Web that will allow to find, share, and combine information more easily. To harvest such power requires robust and scalable data repositories that can store RDF data. ...
  • Su, Ei Thin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    An innovative audio Steganography scheme based on optimize algorithm as Probabilistic Global Search Lausanne (PGSL) in modified discrete cosine transform domain (MDCT) is proposed. Inaudibility and robustness are two ...
  • Tun, Amy; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Digital watermarking technology is now attracting considerable attention as one of the potential solutions for protecting copyrights of digital images. In this paper, digital color image watermarking scheme based on ...
  • Wutyi, Khaing Shwe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Forecasting of weather is very popular in nowadays. But forecasting the future from the observed past is very difficult. There are several forecasting methods for weather data. Among them, evolving artificial neural ...
  • Tin, Hlaing Htake Khaung; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Automatic age prediction system for grayscale facial images is proposed in this paper. Ten age groups, including, are used in the prediction system. The process of the system is divided into three phases: location, ...
  • Soe, Ei Phyu Phyu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Myanmar texts are different from English texts in that they have no spaces to mark the boundaries of words. So, Myanmar word segmentation is a difficult. The processing of Myanmar text is complicated by the fact that ...
  • Dihego, Jose; Braga, Andre; Ramos, Rodrigo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Several efforts in the last years have demonstrated a trend in using models as first class entities on system development. As any major artefact in the development, models are driven by stakeholder and architectural ...
  • Myint, San Hlaing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualized server environment, various services are revealed to high rates of incoming requests. The servers may become overloaded during temporary traffic peaks when more requests arrive than the server is considered ...
  • Tint, Yawai; Mya, Khin Than (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting messages hidden using steganography. This paper proposes steganalysis of audio signal using Independent Component Analysis. A detection method is used for detecting ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data Centre (DC) administrators try to delivering performance guarantees while managing resources for utilization in terms of reducing cost. With the advent of server consolidation provided by virtualization technology, ...
  • Lwin, Khin Moh Moh (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software failures are now known to be a dominant source of system outages. The cost of unplanned outages is higher than the cost of planned outages. Software systems often experience aging related defects which ...
  • Htun, Win Pa Pa (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Building a new document needs the preparation of required information and finding the related written parts that have already identified from existing documents. In this paper, we outline the importance of structuring ...

Search Repository



Browse

My Account