Eleventh International Conference On Computer Applications (ICCA 2013): Recent submissions

  • Gray, Heather (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Integrating the use of Facebook to support student learning and improve student success, is a challenge academics are currently facing. While this may not be crucial in an in-person setting, for students who are studying ...
  • Myint, May Thu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this paper, we motivate and summarize our work on repeatedly generating cryptographic keys from audio files that are user input. Then, the processing steps for the speaker's signal which is used to produce the public ...
  • Soe, Thinn Lai (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This system proposes an indexing structure that is built on the basic context document by using semantic suffix tree clustering and context ontology. Context is any information that can be used to characterize the situation ...
  • Cuong, Nguyen Phu; Nedev, Zhivko; Tin, Duong Trung; Tu, Le Anh (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    We describe the design and implementation of a computer application that can search for a small size balanced set modulo p, with p prime. Additionally, the application can”analyze” and ”visualize” any given balanced set ...
  • Khin, Ei Ei; Phyu, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    A mobile ad-hoc network (MANET) is an autonomous wireless system which consists of several mobile nodes to form an arbitrary and temporary network. As the lack of infrastructure network, MANETs are facing various severe ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Thinzar, Cho (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper intends to describe the process of Digital Image Correlation (DIC) and to find the pixel correlation among the images accurately when they are moved and deformed. It is a popular and effective tool for the ...
  • Lee, Wookyung; Kim, Ah-Leum (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The fusion of images from the optical and SAR sensors enables an effective analysis by complementing the weakness of each other. However, unlike optical image, geometrical distortions commonly occur during image acquisition ...
  • Win, Mya Thidar Myo; Htun, Phyu Thi; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. Current ...
  • Aye, Myat Mon; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership ...
  • Htun, Phyu Thi; Win, Mya Thidar Myo; Khaing, Kyaw Thet (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    There are many Intrusion Detection System (IDS) based on signatures. If a new attacks, which by definition cannot be in the database of signatures is coming, those system cannot detect. The attackers will have a new way ...
  • Win, Chaw Su; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Web pages consist of both informative and non-informative content for the users. Web Page Indexing System, Web Page Classification and Clustering System and Web Information Extraction System that help the users to support ...
  • Wu, Yunong; Kita, Kenji; Matsumoto, Kazuyuki (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this paper, we propose a multi-engine voting system to recognize the multiple emotion states expressed in the Chinese words according to the word identity and the context information, which can better reflect the people's ...
  • Mon, Aye Chan; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Entity Resolution is the task of identifying duplicated records that refer to the same real-world entity. It is costly process that can take up to days for large datasets. Various Blocking Methods have been applied in ...
  • Maung, Su Su; Aung, Nyein Myint Myint (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents the text block segmentation for image search system.Web pages are segmented into blocks for getting the text with images. Text block with images are later used as captions of images and hence plays an ...
  • Soe, Ei Phyu Phyu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Grapheme-to-Phoneme (GTP) conversion is one of the most important parts for text-to-speech synthesis of Myanmar language. TTS system is firstly faced with the conversion of input text into linguistic representation usually ...
  • Htun, Nyi Nyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents a method based on receptor model for finding the shortest smooth path in variable size with safety margin, where clothoid curvature is used for smoothing path. The method modifies the results of grid-based ...
  • Wadan, Christen Mohamed (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    High biomass consumptions have large social, economic and ecological blessings as well as challenges to contend with. Computing biomass determinations demand renewable and non-renewable energy fact-findings. The study aims ...
  • Vaish, Abhishek; Jha, Anand Sanjeev Kumar Atul Krishna (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The main area of discussion of our paper “Security of Mobile Agent” is on the host platform attacking the mobile agents. Malicious host is a system in network which can take advantage of a mobile agent. A malicious ...
  • Nakajima, Hideharu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Corpora must be developed for realizing statistical language models; however, it is labor-intensive work and is very expensive. Often corpora resources are scant for such a domain as new language, new task, and new ...

Search Repository



Browse

My Account