Eleventh International Conference On Computer Applications (ICCA 2013): Recent submissions

  • Thu, Ye Kyaw; Finch, Andrew; Sagisaka, Yoshinori; Sumita, Eiichiro (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Myanmar sentences are written as contiguous sequences of syllables with no characters delimiting the words. In statistical machine translation (SMT), word segmentation is a necessary step for languages that do not ...
  • Nguyen, Tuan Anh; Lee, Seulki; Wi, Miseon; Eom, Taehoon; Park, Jong Sou; Comina, Germán; Bedon, Hector (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Unmanned Airship is useful and applicable for a variety of fields especially in resource exploration and environmental monitoring. This measure enhances the flexibility, on-demand supply and reasonable cost. This is a ...
  • Myint, San Hlaing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The main factor in measuring server performance is the accuracy of detection mechanisms. Sever is needed to detect server overload condition accurately. Therefore, it can be satisfied customers by reducing request drop ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    It is clear that physically active people have a lower disease risk than the others who don’t have. Nowadays, the components of activity which determine particular health gains are poorly understood. Thus the analysis for ...
  • Kyae, K; Aung, Win Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Word sense disambiguation (WSD) is an important technique for many NLP applications such as machine translation, content analysis and information retrieval. In the information retrieval (IR) system, ambiguous words are ...
  • Zaw, Moe Moe; Mon, Ei Ei (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Clustering is a division of data into groups of similar objects. Each group called a cluster consists of objects that are similar between themselves and dissimilar compared to objects of the other groups. Cuckoo Search ...
  • Yee, Nyo Nyo; Thant, Hnin Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In mobile environment, transactions are initiated from mobile host and that may be executed at mobile host or fixed host. This system proposes Two-Shadow Speculative Concurrency Control (SCC-2S) with Priority mechanism for ...
  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Aye, Aye; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In today's world of distributed environment, password authentication is very important to protect customer's sensitive data over Internet. The mainly two types of password are static password and dynamic password. Static ...
  • Tun, Tayar Myo (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many sudden and short period noises in natural envrioments. In this paper, noise reduction is efficiently performed for additive white noise and an automatic thresholding method for discriminating of noise / ...
  • Swe, Minn; Das, Partha Pratim; Htay, Myat Thet Lyar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Optimization is ubiquitous, from industry to engineering design, from scheduling your daily routine to your holiday. In many large organizations, from governments to private companies, management of transferring staffs ...
  • TSUBAKI, Hajime; OGAMI, Takeru; KONDO, Mariko; SAGISAKA, Yoshinori (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Aiming at objective evaluation of L2 (second language) learners' proficiency, we statistically analyzed mispronunciation characteristics of Japanese learners' English speech based on phonetic knowledge. Through automatic ...
  • kyaw, Mya Thidar; Soe, Kyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms ...
  • Wai, Thin Thin; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-12-26)
    Reordering is one of the most challenging and important problems in Statistical Machine Translation. Without reordering capabilities, sentences can be translated correctly only in the case when both languages implied in ...
  • Hlaing, Yu Wai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Apart from the main content blocks, almost all web pages on the Internet contain such blocks as navigation, copyright information, privacy notices, and advertisements, which are not related to the topic of the web page. ...
  • Thuzar, Myat (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Ear detection is an important part of an ear recognition system. This paper proposes ear recognition based on Gabor wavelets and Support Vector Machine (SVM). The framework has three steps. In the first step, the ear is ...
  • Linn, Khaing Wah Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    As the use of web is increasing more day by day, the World Wide Web is rapidly growing on all aspects. It is the duty of service provider to provide relevant information to the internet user against their query submitted ...
  • Lwin, Hnin Thant (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The Travelling Salesman Problem (TSP) is one of the hardest and the most fundamental problems in Computer Science. Although several techniques have been used in the past to reduce the running time of TSP, Genetic algorithms ...
  • Thu, Aye Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases ...
  • Hlaing, Thuzar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Fuzzy logic is appropriated for the intrusion detection problem because many quantitative features are involved in intrusion detection. Fuzzy logic system can handle simultaneously the numerical data and linguistic knowledge. ...

Search Repository



Browse

My Account