UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Issue Date

Browsing International Conference on Computer Applications (ICCA) by Issue Date

Sort by: Order: Results:

  • Myint, Julia; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The need and use of scalable storage on cloud has rapidly increased in last few years. Organizations need large amount of storage for their operational data and backups. To address this need, high performance storage ...
  • Nandar, Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Pipelining is an implementation technique whereby multiple instructions are overlapped in execution; it takes advantage of parallelism that exits among the actions needed to execute an instruction. Today, pipelining ...
  • Myint, Khin Swe Swe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Virtualization can provide significant benefits in data centers by eliminating overload nodes. An increasing workload can be handled by allocating the resources to a virtual server and storage, if idle resources are ...
  • Tun, Thant Zin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, virtualization technologies become increasingly popular in enterprise and organizational networks: such as data center. In order to facilitate fault management, highavailability, load balancing and low-level ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’ ...
  • Zin, Wai Wai; Soe, Than Naing (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The network security is very important for data transmission on the internet and security threat is very important challenges in any communication system. This security of information can be achieved by using encryption and ...
  • Mar, Yi Yi; Nwe, Khine Moe; Maw, Aung Htein (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Range query processing is an essential role in many P2P applications including database indexing, distributed computing and location aware computing and commercial services based on current user’s location. Most of ...
  • Thandar, Aye Mya (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Several recent machine learning publications demonstrate the utility of using feature selection algorithms in many learning. Feature selection helps to acquire better understanding about the data by telling which the ...
  • Hlaing, Nwe Nwe; Nyunt, Thi Thi Soe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The Web is increasingly becoming a very large information source. However, the information is visually structured such that it is easy for humans to recognize data records and presentation patterns, but not for computers. ...
  • Aung, Nyein Thwet Thwet; Soe, Khin Mar; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Word Sense Disambiguation (WSD) has always been a key problem in Natural Language Processing. WSD is defined as the task of finding the correct sense of a word in a specific context. There is not any cited work for ...
  • Lin, Khin Saw (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper presents a simple and efficient approach for predicting the dynamic behavior of the sucker rod string. The dynamic behavior of the sucker rod string is an important factor for predicting the performance of a ...
  • Zaw, Sai Maung Maung; Maw, Aung Htein; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In wireless sensor networks (WSNs), energy is a very scarce resource and has to be managed wisely in order to extend the life of the sensors. Therefore, to be energy-efficient, this paper is presented as hybrid protocol ...
  • Bharanitharan, K. (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    H.264, MPEG-4 Part 10, is the latest digital video coding standard that achieves very high data compression by using several new coding features. One of the key features is the intra prediction based on the rate distortion ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Htet, Thu Thu; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Steganalysis, the method to detect steganographically embedded hidden messages in digital data, has received an increasing interest in recent years. Although significant research efforts have been devoted to develop ...
  • Wutyi, Khaing Shwe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Linear Programming (LP) is a class of mathematical programming models concerned with the efficient allocation of limited resources to specified activities with the objective of meeting a desired goal. Linear ...
  • Nyein, Swe Swe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The rapid expansion of the Internet has made Web a popular place for disseminating and collecting information from the web. The noisy items in web pages are one of the major problems to extract the main contents. It ...
  • Kim, Myong Hee; Kim, Chang-Soo; Rhee, Kyung-Hyune; Park, Man-Gon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We propose a statistical estimation framework to assess energy saving effectiveness of the sensor nodes which have been deployed in a rough physical environment and consisted in a wireless sensor network by use of ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In today digital age, there are more demands to improve techniques for information security. One of the solutions is steganography, hiding sensitive information within innocentlooking cover media. In this paper, we ...
  • Phyu, Myat Pwint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As storage systems grow larger and more complex, the traditional block-based file systems cannot satisfy the large workload. More recent distributed file systems have adopted architectures based on object-based ...

Search Repository



Browse

My Account