Tenth International Conference On Computer Applications (ICCA 2012): Recent submissions

  • Thant, Phyo Thandar; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data storage management plays a vital role in cloud computing environment. The researchers are still trying to make the cloud data storage system to be more mature. And there are two major requirements of datastores ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing paradigm contains many shared resources such as infrastructures, data storage, various platforms and software. In cloud storage service, consistency not only influences the performance and availability ...
  • Naing, Win Win; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing provides access to large pool of data, applications and computational resources. Many researchers have been proposed several open-source Infrastructure-asa-Service (IaaS) cloud management frameworks (e.g, ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Myint, Julia; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data availability is one of the key requirements for cloud storage system. Data replication has been widely used as a mean of increasing the availability in traditional distributed databases, peer-to-peer (P2P) systems, ...
  • Yee, Tin Tin; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure. Cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of ...
  • Myint, San Hlaing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualized server environment, various services are revealed to high rates of incoming requests. The servers may become overloaded during temporary traffic peaks when more requests arrive than the server is considered ...
  • Thaing, Aye Nwe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In chemical informatics, the structure of chemical compound can be represented as graph with atoms as nodes and bonds as edges. Exact structural graph matching (automorphism), exact substructure graph matching ...
  • Lwin, Myint Myint; Nyunt, Thi Thi Soe; Yuzana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data exchanging is involving as an important role in the Web application and Extensible Markup Language (XML) is also accepted as the standard for exchanging information between the heterogeneous systems. The XML schema ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper makes a comparative study of the Extended Great Deluge (EGD) based hype heuristic (HH) for the university exam timetabling problem. Indeed, Hyper-Heuristic is not new in AI field. It is an emerged ...
  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Tin, Hlaing May (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Recently, most IT organizations are transforming their data centers to smaller virtualized ones with the help of server virtualization. In virtualized servers, multiple applications are consolidated into a physical server ...
  • Myint, Khin Swe Swe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Virtualization techniques provide the carving individual physical servers into multiple virtual containers that can be run and managed separately. However, due to the uncertainty of workload variation, the workloads ...
  • Tun, Tayar Myo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The various positioning application meets strict needs such as car navigation, mapping, surveying, security, agriculture and so on. An Intelligent Cruise control system is simulated and demonstrated using GPS as the ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Semantic Web is an extension of the current Web that will allow to find, share, and combine information more easily. To harvest such power requires robust and scalable data repositories that can store RDF data. ...
  • Su, Ei Thin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    An innovative audio Steganography scheme based on optimize algorithm as Probabilistic Global Search Lausanne (PGSL) in modified discrete cosine transform domain (MDCT) is proposed. Inaudibility and robustness are two ...
  • Win, Zin Mar; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Fingerprint recognition is one of the most well-known and publicized biometrics for personal identification. Fingerprints exhibit oriented texture-like patterns. The texture information of the fingerprint can be used ...
  • Oo, Nandar Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Myanmar language input method editor (IME) is widely used in embedded system of today Android portable devices such as mobile phones, tablets and e-books readers etc. as an important part of human-computer ...
  • Thu, Soe Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In this paper, content-based music similarity function from acoustic music signal in an efficient way is considered. This function is to determine similarities among songs, particularly, a piece of input music ...

Search Repository



Browse

My Account