UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Issue Date

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Issue Date

Sort by: Order: Results:

  • Win, Zin Mar; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Fingerprint recognition is one of the most well-known and publicized biometrics for personal identification. Fingerprints exhibit oriented texture-like patterns. The texture information of the fingerprint can be used ...
  • Htike, Theingi; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar handwritten characters. This paper involves three important steps, ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...
  • Win, Thinn Thinn (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the fast growth of Semantic Web, more and more Resource Description Framework (RDF) data are created and widely used in Web applications and information systems. Recently, efficient RDF data management on top of ...
  • Mon, Ei Ei; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is one of today’s most attractive technology areas due to its many advantages like Highly scalable, on-demand, web-accessed IT resources with major cost / cash and flexibility. In this paper, the ...
  • Frank, Lars (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In central databases the consistency of data is normally implemented by using the ACID (Atomicity, Consistency, Isolation and Durability) properties of a DBMS (Data Base Management System). In practice, it is not ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Oo, May Mar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, network – oriented computing environments require high – performance, distributed database systems that can satisfy both the data consistency control of replica management and data storage requirements ...
  • Lin, Nay Yee; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents a system for detection and suggestion English grammar errors in Myanmar-English statistical machine translation system. There are very few spelling errors in the translation output, because all words ...
  • Phyu, Myat Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Today’s storage systems have a great challenge for the long-term storage of massive amounts of unstructured data. Availability and reliability is the properties of the most storage system. In this paper, the data ...
  • Zin, Wai Wai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to advances in technologies, most of the information is kept electronically. Steganography and Cryptography are two popular ways of sending vital information in a secret way. In this paper, an image steganography ...
  • Ko, Aye Chan; Aung, Nay Aung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography is the approach for hiding any secret message in a variety of multimedia carriers like text, images, audio or video files. Whenever hiding a secret message, it is very important to make it invisible. This ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Lin, Nu Nan Dar; Thu, Ye Kyaw; Matsumoto, Mitsuji; Urano, Yoshiyori (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The World Wide Web is an information resource with virtually unlimited potential. However, this potential is relatively untapped because locating relevant information can often be time consuming and fruitless. If ...
  • Thandar, Aye Mya; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In artificial neural networks, the parameters may include the number of layers, the number of hidden units, the activation function and the algorithm parameters such as learning rate for optimization. Many researchers ...
  • Khaing, Myo; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    A novel metric that integrates the correlation and reliability information between each feature and each class obtained from Multiple Correspondence Analysis (MCA) is currently the popular solution to score the features ...
  • Kyi, Hsu Mon; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is deployed a large set of virtualized computing resources in different infrastructures and various development platforms. One of the key challenges in cloud computing system is virtual resources and ...
  • Mar, Yi Yi; Maw, Aung Htein; Nwe, Khine Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Query processing is an essential role in large scale distributed network application environment including database indexing, distributed computing, location aware services and network monitoring system. In order to ...
  • Phyo, Zar Lwin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The workload in each node changes dynamically over time in large-scale data centers, so the workload in some machines may exceeds the threshold, which not only can’t guarantee the quality of service requirements (QOS), ...
  • Nyo, Aye Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Many cryptographic protocols require random or pseudorandom inputs at various points (e.g., for generating digital signatures, or in some authentication protocols). Pseudorandom numbers are critical part of modern ...

Search Repository



Browse

My Account