UCSY's Research Repository

Browsing Ninth International Conference On Computer Applications (ICCA 2011) by Title

Browsing Ninth International Conference On Computer Applications (ICCA 2011) by Title

Sort by: Order: Results:

  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’ ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The Semantic Web, which represents a web of knowledge, offers us new opportunities to search for knowledge and information. To harvest such search power requires robust and scalable data repositories that can store RDF ...
  • Kyi, Hsu Mon; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud computing is a scalable distributed computing environment in which a large set of virtualized computing resources, different infrastructures, various development platforms and useful software are delivered as a ...
  • Bharanitharan, K. (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    H.264, MPEG-4 Part 10, is the latest digital video coding standard that achieves very high data compression by using several new coding features. One of the key features is the intra prediction based on the rate distortion ...
  • Doyoddorj, Munkhbaatar; Kim, Chang-Soo; Park, Man-Gon; Rhee, Kyung-Hyune (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We present a region-based robust 3D face recognition approach which is robust to facial expressions, illumination changes and occlusions. Facial surface is often deformed by expressions. Generally, the mouth is the ...
  • Sithu, Mya; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, a three level resource management system for virtualized data center is presented. Three levels are defined as vitrual machine level controller (VLC), host level controller (HLC) and central level ...
  • Htwe, Thandar Su Nge (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Load-balancing problems arise in many applications, but, most importantly, they play a special role in the operation of parallel and distributed computing system. Scheduling in distributed operating systems has a ...
  • Aye, Chan Myae (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Assessing the trustworthiness of reviews is a key issue for the maintainers of opinion such as Amazon.com. Opinion reviews on products and services are used by potential customers before deciding to purchase a product. ...
  • Su, Ei Thin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper managed to propose robust audio data hiding through optimization-based problem transformation method, Probabilistic Global Search Lausanne Algorithm (PGSL) in modified discrete cosine transform (MDCT) ...
  • Myint, Julia; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The need and use of scalable storage on cloud has rapidly increased in last few years. Organizations need large amount of storage for their operational data and backups. To address this need, high performance storage ...
  • Zin, Wai Wai; Soe, Than Naing (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The network security is very important for data transmission on the internet and security threat is very important challenges in any communication system. This security of information can be achieved by using encryption and ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...
  • Hlaing, Pa Pa (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Data centers have become the nextgeneration computing platforms for enterprises and Internet users. This is primarily due to the economic and technical advantages of resource sharing in data centers. By sharing ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Tun, Thant Zin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, virtualization technologies become increasingly popular in enterprise and organizational networks: such as data center. In order to facilitate fault management, highavailability, load balancing and low-level ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Wah, Naw Lay (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A Web site interface is a complex mix of text, links, graphic elements, formatting and other aspects that affect the site’s overall quality. The concepts of traditional software engineering usability guidelines can be ...
  • Tint, Yawai; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The research on blind source separation is focus in the community of signal processing and has been developed in recent years. This paper proposes enhance audio steganalysis technique, which adopts Independent Component ...
  • Kim, Myong Hee; Kim, Chang-Soo; Rhee, Kyung-Hyune; Park, Man-Gon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We propose a statistical estimation framework to assess energy saving effectiveness of the sensor nodes which have been deployed in a rough physical environment and consisted in a wireless sensor network by use of ...
  • Lin, Nu Nan Dar; Thu, Ye Kyaw; Matsumoto, Mitsuji; Urano, Yoshiyori (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, Ontology is becoming increasingly widespread in research field and application area of computer science. Ontology is used not only in semantic web but also in database and applications that need to share domain ...

Search Repository



Browse

My Account