UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Issue Date

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Issue Date

Sort by: Order: Results:

  • Soe, Ei Phyu Phyu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Grapheme-to-Phoneme (GTP) conversion is one of the most important parts for text-to-speech synthesis of Myanmar language. TTS system is firstly faced with the conversion of input text into linguistic representation usually ...
  • Thandar, Aye Mya; Khaing, Myo Kay (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Artificial neural networks (ANNs) are new technology emerged from approximate simulation of human brain and they have been successfully applied in many fields. Many researchers have tried to achieve optimal or near-optimal ...
  • Myint, Theint Zarni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent research has demonstrated the strong performance of hidden Markov models (HMM) applied to information extraction that the text of populating database slots with corresponding phrases from text documents. Hidden ...
  • Wadan, Christen Mohamed (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    High biomass consumptions have large social, economic and ecological blessings as well as challenges to contend with. Computing biomass determinations demand renewable and non-renewable energy fact-findings. The study aims ...
  • Thein, Khin Me Me (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today, various types of vast amount of information have been publishing on the World Wide Web. To discover and meet user information needs, the use of document clustering in information retrieval system is necessarily ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Phyu, Myat Pwint; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today’s storage systems have a major issue for the long-term storage of massive amounts of unstructured data. Availability and reliability are the basic properties of the most storage system. Replication which is the ...
  • Tun, Thant Zin (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Virtualization is a key piece of modern data center design. Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance. A replication mechanism is proposed to provide ...
  • Aye, Zin Win (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents adaptive Medical Image Compression using adaptive Huffman encoding technique for mobile devices to reduce the transmission energy of images through wireless networks. With an increase in the usage of ...
  • Win, Ngu Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Myint, San Hlaing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The main factor in measuring server performance is the accuracy of detection mechanisms. Sever is needed to detect server overload condition accurately. Therefore, it can be satisfied customers by reducing request drop ...
  • Hlaing, Yu Wai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Apart from the main content blocks, almost all web pages on the Internet contain such blocks as navigation, copyright information, privacy notices, and advertisements, which are not related to the topic of the web page. ...
  • Yee, Nyo Nyo; Thant, Hnin Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In mobile environment, transactions are initiated from mobile host and that may be executed at mobile host or fixed host. This system proposes Two-Shadow Speculative Concurrency Control (SCC-2S) with Priority mechanism for ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Htun, Nyi Nyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents a method based on receptor model for finding the shortest smooth path in variable size with safety margin, where clothoid curvature is used for smoothing path. The method modifies the results of grid-based ...
  • Aung, Ohnmar; Thein, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases (middle ...
  • Win, Thidar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The Extensible Markup Language (XML) is used for representing data over the web. Database systems are well-known for consistent storage, retrieval, and manipulation of data. Storing XML documents in relational databases ...
  • Thinzar, Cho (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper intends to describe the process of Digital Image Correlation (DIC) and to find the pixel correlation among the images accurately when they are moved and deformed. It is a popular and effective tool for the ...
  • Thu, Ye Kyaw; Finch, Andrew; Sagisaka, Yoshinori; Sumita, Eiichiro (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Myanmar sentences are written as contiguous sequences of syllables with no characters delimiting the words. In statistical machine translation (SMT), word segmentation is a necessary step for languages that do not ...

Search Repository



Browse

My Account