UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Issue Date

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Issue Date

Sort by: Order: Results:

  • Yousuf, Khaled Bin; Bhuiyan, Touhid; Khan, Sharmin; Nahar, Aynun; Ali, Nawab Yousuf (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    One of the vital mission of e-learning is to allow people to learn for personal accomplishment or to earn a professional degree, without physically attending a traditional university or academic setting. E-learning can ...
  • Gruenwald, Hermann (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper focuses on the large scale implementation of information systems in ASEAN. We use the complexity of the Hospital Information System (HIS) to gather lessons learned from a stakeholders’ perspective through ...
  • Phyo, Zar Lwin; Thein, Thandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Resource allocation plays an important role in Virtualized Data Center (VDC). The applications running in VDC are mostly business critical applications with Quality-of-Service (QoS) requirements. Moreover, dynamic ...
  • Swe, Minn; Das, Partha Pratim; Htay, Myat Thet Lyar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Optimization is ubiquitous, from industry to engineering design, from scheduling your daily routine to your holiday. In many large organizations, from governments to private companies, management of transferring staffs ...
  • Naing, Myo Myo Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In information retrieval system, classification of web queries is important to provide search result effectively and efficiently. Web query classification is to classify a web search query into a set of intended categories. ...
  • Nguyen, Tuan Anh; Lee, Seulki; Wi, Miseon; Eom, Taehoon; Park, Jong Sou; Comina, Germán; Bedon, Hector (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Unmanned Airship is useful and applicable for a variety of fields especially in resource exploration and environmental monitoring. This measure enhances the flexibility, on-demand supply and reasonable cost. This is a ...
  • Soe, Thinn Lai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This system proposes an indexing structure that is built on the basic context document by using semantic suffix tree clustering and context ontology. Context is any information that can be used to characterize the situation ...
  • Aye, Aye; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In today's world of distributed environment, password authentication is very important to protect customer's sensitive data over Internet. The mainly two types of password are static password and dynamic password. Static ...
  • Htet, Thu Thu; Mya, Khin Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Information hiding in video streams with the development of network and multimedia technologies has played an important role in the steganographical field, and correspondingly video stegnanlysis techniques are catching ...
  • Kyae, K; Aung, Win Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Word sense disambiguation (WSD) is an important technique for many NLP applications such as machine translation, content analysis and information retrieval. In the information retrieval (IR) system, ambiguous words are ...
  • San, Pan Ei (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents an automatic text classification system enhanced conference management system. A conference management system is a digital library of a particular conference, where users provide, route and seek for ...
  • Cuong, Nguyen Phu; Nedev, Zhivko; Tin, Duong Trung; Tu, Le Anh (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    We describe the design and implementation of a computer application that can search for a small size balanced set modulo p, with p prime. Additionally, the application can”analyze” and ”visualize” any given balanced set ...
  • Zaw, Win; Min, Hla Yin (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Wireless sensor network (WSN) are becoming more attractive due to the low cost deployment, small size, low energy consumption and simple operation. Sensors energy cannot support long haul communication as changing energy ...
  • Thu, Aye Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases ...
  • Mon, Aye Chan; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Entity Resolution is the task of identifying duplicated records that refer to the same real-world entity. It is costly process that can take up to days for large datasets. Various Blocking Methods have been applied in ...
  • Aye, Myat Mon; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership ...
  • Mya, Khin Than; Tint, Yawai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. In this paper, techniques are presented which aim at the breaking of steganography usage in digital ...
  • Khaing, Myo; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Feature selection is often an essential data processing step prior to applying a learning algorithm. The removal of irrelevant and redundant information improves the performance of machine learning algorithms. In this ...
  • Lwin, Hnin Thant (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The Travelling Salesman Problem (TSP) is one of the hardest and the most fundamental problems in Computer Science. Although several techniques have been used in the past to reduce the running time of TSP, Genetic algorithms ...
  • Wu, Yunong; Kita, Kenji; Matsumoto, Kazuyuki (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this paper, we propose a multi-engine voting system to recognize the multiple emotion states expressed in the Chinese words according to the word identity and the context information, which can better reflect the people's ...

Search Repository



Browse

My Account