Conferences

Recent Submissions

  • Tin, Hlaing May (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Recently, most IT organizations are transforming their data centers to smaller virtualized ones with the help of server virtualization. In virtualized servers, multiple applications are consolidated into a physical server ...
  • Myint, Khin Swe Swe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Virtualization techniques provide the carving individual physical servers into multiple virtual containers that can be run and managed separately. However, due to the uncertainty of workload variation, the workloads ...
  • Tun, Tayar Myo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The various positioning application meets strict needs such as car navigation, mapping, surveying, security, agriculture and so on. An Intelligent Cruise control system is simulated and demonstrated using GPS as the ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Semantic Web is an extension of the current Web that will allow to find, share, and combine information more easily. To harvest such power requires robust and scalable data repositories that can store RDF data. ...
  • Su, Ei Thin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    An innovative audio Steganography scheme based on optimize algorithm as Probabilistic Global Search Lausanne (PGSL) in modified discrete cosine transform domain (MDCT) is proposed. Inaudibility and robustness are two ...
  • Win, Zin Mar; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Fingerprint recognition is one of the most well-known and publicized biometrics for personal identification. Fingerprints exhibit oriented texture-like patterns. The texture information of the fingerprint can be used ...
  • Oo, Nandar Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Myanmar language input method editor (IME) is widely used in embedded system of today Android portable devices such as mobile phones, tablets and e-books readers etc. as an important part of human-computer ...
  • Thu, Soe Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In this paper, content-based music similarity function from acoustic music signal in an efficient way is considered. This function is to determine similarities among songs, particularly, a piece of input music ...
  • Phyu, Myat Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Today’s storage systems have a great challenge for the long-term storage of massive amounts of unstructured data. Availability and reliability is the properties of the most storage system. In this paper, the data ...
  • Tun, Amy; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Digital watermarking technology is now attracting considerable attention as one of the potential solutions for protecting copyrights of digital images. In this paper, digital color image watermarking scheme based on ...
  • Phyu, Hnin Pwint; Nyunt, Thi Thi Soe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software maintainability prediction enables organizations to predict the maintainability of the software systems and can then help in reducing the maintenance effort and thus, reducing the overall cost and time spent ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Ranking is a crucial part of information retrieval. Queries describe the users’ search intent and therefore they play an essential role in the context of ranking for information retrieval. The diverse feature impacts ...
  • Mar, Yi Yi; Maw, Aung Htein; Nwe, Khine Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Query processing is an essential role in large scale distributed network application environment including database indexing, distributed computing, location aware services and network monitoring system. In order to ...
  • Htike, Theingi; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar handwritten characters. This paper involves three important steps, ...
  • Maung, Tin; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents system architecture of a Context and Preference-Aware Location-based Services system (CPALBS, for short), that delivers personalized services to its customers based on the user preference query. ...
  • Thandar, Aye Mya; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In artificial neural networks, the parameters may include the number of layers, the number of hidden units, the activation function and the algorithm parameters such as learning rate for optimization. Many researchers ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Web is one of the most popular and richest sources of information. The source of data for a Web page is generally a relational database which has been recognized as a key factor in generating huge amounts of data ...
  • Hlaing, Thuzar; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is ...
  • Thet, Yi Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Finding all occurrences of a twig pattern query is a core operation of XML query processing system. Many algorithms have been proposed. Existing algorithms generate individual path matches and then stitch them together ...
  • Tint, Yawai; Mya, Khin Than (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting messages hidden using steganography. This paper proposes steganalysis of audio signal using Independent Component Analysis. A detection method is used for detecting ...

View more