UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Sort by: Order: Results:

  • Aye, Zin Win (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents adaptive Medical Image Compression using adaptive Huffman encoding technique for mobile devices to reduce the transmission energy of images through wireless networks. With an increase in the usage of ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...
  • Linn, Khaing Wah Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As the use of web is increasing more day by day, the World Wide Web is rapidly growing on all aspects. It is the duty of service provider to provide relevant information to the internet user against their query submitted ...
  • TSUBAKI, Hajime; OGAMI, Takeru; KONDO, Mariko; SAGISAKA, Yoshinori (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Aiming at objective evaluation of L2 (second language) learners' proficiency, we statistically analyzed mispronunciation characteristics of Japanese learners' English speech based on phonetic knowledge. Through automatic ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Htun, Phyu Thi; Win, Mya Thidar Myo; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many Intrusion Detection System (IDS) based on signatures. If a new attacks, which by definition cannot be in the database of signatures is coming, those system cannot detect. The attackers will have a new way ...
  • Win, Mya Thidar Myo; Htun, Phyu Thi; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. Current ...
  • Cuong, Nguyen Phu; Nedev, Zhivko; Tin, Duong Trung; Tu, Le Anh (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    We describe the design and implementation of a computer application that can search for a small size balanced set modulo p, with p prime. Additionally, the application can”analyze” and ”visualize” any given balanced set ...
  • Tun, Tayar Myo (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many sudden and short period noises in natural envrioments. In this paper, noise reduction is efficiently performed for additive white noise and an automatic thresholding method for discriminating of noise / ...
  • Nguyen, Dinh Thuan; Lam, Vu Tuan Nguyen; Nguyen, Gia Toan; Hoang, Tung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, the application of data mining in the healthcare industry is necessary. Data mining brings a set of tools and techniques that can be applied to discover hidden patterns that provide healthcare professionals ...
  • Thandar, Aye Mya; Khaing, Myo Kay (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Artificial neural networks (ANNs) are new technology emerged from approximate simulation of human brain and they have been successfully applied in many fields. Many researchers have tried to achieve optimal or near-optimal ...
  • Lee, Wookyung; Kim, Ah-Leum (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The fusion of images from the optical and SAR sensors enables an effective analysis by complementing the weakness of each other. However, unlike optical image, geometrical distortions commonly occur during image acquisition ...
  • San, Pan Ei (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents an automatic text classification system enhanced conference management system. A conference management system is a digital library of a particular conference, where users provide, route and seek for ...
  • Tun, Khin Nwe Ni; San, Kyawt Kyawt (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The development of Semantic Web mainly depends on enrichment of Semantic Web metadata. The semantic web represents metadata as a relation of triples using the graph based data model, Resource Description Framework (RDF) ...
  • Myint, Phyu Hninn; Htwe, Tin Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The basic word identification is an essential process in Part-of-Speech tagging as a preprocessing step. Before disambiguating among more than one Part-of-Speech tags of one basic or root word, word boundaries need to ...
  • Tun, Amy; Thein, Yadana (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As a potential key to defend illegal copying of digital multimedia objects, digital watermarking technology is now attracting significant awareness. With the help of a combined Lifting Wavelet Transform (LWT) and Discrete ...
  • Mya, Khin Than; Tint, Yawai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. In this paper, techniques are presented which aim at the breaking of steganography usage in digital ...
  • Kyaw, Win Thuzar; Thein, Ni Lar; Htay, Hla Hla (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Since people have to accept enormous information nowadays, they are unmanageable to absorb the main themes of their interested articles. More and more information are overloaded, Automatic Text Summarization (ATS) ...
  • Naing, Win Win; Naing, Thinn Thu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Cloud computing provides access to large pool of data, applications and computational resources. Many researchers have been proposed several open-source private cloud management frameworks (e.g., Eucalyptus, Nimbus, and ...
  • Myo, Myint Myat; Thein, Thandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing offer highly scalable, and economical infrastructure for promising heterogeneous platforms and various applications. According to the growing demand nature of cloud infrastructure resources, the cloud ...

Search Repository



Browse

My Account