UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Sort by: Order: Results:

  • Aye, Tin Moe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Since Fast Fourier Transforms are key components in many of the Digital Signal Processing applications and it is computationally intensive, a software implementation might not meet essential requirements in real time ...
  • Zaw, Moe Moe; Mon, Ei Ei (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Clustering is a division of data into groups of similar objects. Each group called a cluster consists of objects that are similar between themselves and dissimilar compared to objects of the other groups. Cuckoo Search ...
  • Thein, Khin Me Me (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today, various types of vast amount of information have been publishing on the World Wide Web. To discover and meet user information needs, the use of document clustering in information retrieval system is necessarily ...
  • Gruenwald, Hermann (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper focuses on the large scale implementation of information systems in ASEAN. We use the complexity of the Hospital Information System (HIS) to gather lessons learned from a stakeholders’ perspective through ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the advent of virtualization technology, multiple heterogeneous virtual machines (VMs) can be coexisted on a physical server. Dynamic allocation of server’s resources prevents over provisioning and under provisioning ...
  • Aung, Ohnmar; Thein, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases (middle ...
  • Khin, Ei Ei; Phyu, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    A mobile ad-hoc network (MANET) is an autonomous wireless system which consists of several mobile nodes to form an arbitrary and temporary network. As the lack of infrastructure network, MANETs are facing various severe ...
  • Maw, Tin Win; Zaw, Myo Hein (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today’s world is experiencing many natural disasters like earthquakes, flooding, Tsunamis and forest firing, etc. Therefore, it is not only necessary to use widely Wireless Sensor Networks in the hostile environments all ...
  • Soe, Wunna (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent advances in web and mobile computing technologies provide users with a vast amount of information and services such as online news, weather forecasting news, shopping, banking, music, movies, and online games. The ...
  • Khaing, Myo; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Feature selection is often an essential data processing step prior to applying a learning algorithm. The removal of irrelevant and redundant information improves the performance of machine learning algorithms. In this ...
  • Mon, Aye Myat; Thein, Thandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02)
    In Myanmar Language, Pronunciation and orthography has differences because spelling is often not an accurate reflection of pronunciation. Pronunciation of a word may lead to misspelling. In this paper, we present Myanmar ...
  • Hlaing, Pa Pa (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Energy consumption of data centers has been increasing continuously due to rising demands of computational power. One promising approach of reducing this energy consumption is the consolidation of servers by virtualization. ...
  • Thu, Aye Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Vaish, Abhishek; Jha, Anand Sanjeev Kumar Atul Krishna (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The main area of discussion of our paper “Security of Mobile Agent” is on the host platform attacking the mobile agents. Malicious host is a system in network which can take advantage of a mobile agent. A malicious ...
  • Wadan, Christen Mohamed (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    High biomass consumptions have large social, economic and ecological blessings as well as challenges to contend with. Computing biomass determinations demand renewable and non-renewable energy fact-findings. The study aims ...
  • Naing, Myo Myo Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In information retrieval system, classification of web queries is important to provide search result effectively and efficiently. Web query classification is to classify a web search query into a set of intended categories. ...
  • Min, Nandar Win; Hlaing, Aye Nandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Obtaining important pages rapidly is very useful when a crawler cannot visit the entire Web in a reasonable amount of time. One approach is using focused crawler because it tries to download only pages with pre-defined ...
  • kyaw, Mya Thidar; Soe, Kyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms ...
  • Myint, Theint Zarni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent research has demonstrated the strong performance of hidden Markov models (HMM) applied to information extraction that the text of populating database slots with corresponding phrases from text documents. Hidden ...

Search Repository



Browse

My Account