Ninth International Conference On Computer Applications (ICCA 2011): Recent submissions

  • Phyo, Zar Lwin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Grid computing can provide abundant resources to assist many studies and it can be employed in more and more projects that have so far yielded numerous findings. However, in grid environment, many distributed resources ...
  • Shwe, Theint Theint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. As a consequence of this, Web Usage Mining becomes one of the popular research areas. It involves ...
  • Thaw, Tin Zar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Extensible Markup Language (XML) Schema documents (XSD) play an important role in software development process and need to be qualified with software qualities. A good quality design of XSD increases software productivity ...
  • Mon, Pann Yu; Mikami, Yoshiki (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    With the enormous growth of the World Wide Web, Search engines or Information Retrieval (IR) play a critical role in retrieving information from the borderless Web. Although many search engines are available for the ...
  • Soe, The` The` (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A variety of Verb Phrase exists in Myanmar Language including Simple Verb Phrase, Compound Verb Phrase and so on. This paper explains the feature of Myanmar Verb Phrase and English Verb Phrase. And then, the system ...
  • Ei, Nyein Nyein (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The system extracts optimal rule from weather data set based on rough set theory. The main idea of rough set theory is to obtain as simple as rules from the given database by reducing the database while holding the ...
  • Kim, Myong Hee; Kim, Chang-Soo; Rhee, Kyung-Hyune; Park, Man-Gon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We propose a statistical estimation framework to assess energy saving effectiveness of the sensor nodes which have been deployed in a rough physical environment and consisted in a wireless sensor network by use of ...
  • Kim, Chang Soo; Won, Won Seok; Park, Man Gon; Rhee, Kyung Hyune; Kim, Young Seup (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Heavy rains have caused an amount of damage from flooding and landslides nationwide. Specially, because of flooded road when disasters occurred, traffic congestion and isolation have caused many losses to drivers during ...
  • Aye, Chan Myae (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Assessing the trustworthiness of reviews is a key issue for the maintainers of opinion such as Amazon.com. Opinion reviews on products and services are used by potential customers before deciding to purchase a product. ...
  • Thet, Yi Mon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, information dissemination applications are very popular and much of the data exchange over the Internet. Existing XML filtering techniques based on a publish/subscribe model on highly structured data marked ...
  • Hlaing, Thuzar; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    To avoid high computational costs in identifying intrusions by IDSs, the size of a dataset needs to be reduced. Feature selection is considered a problem of global combinatorial optimization in machine learning, which ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’ ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A relational database is often operated by means of a structured query language (SQL). When composing SQL-queries one must have an understanding of the SQL syntax to be able to produce a query the database can ...
  • Win, Myint Myint; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Manually produced lexical resources are time-consuming and labour-intensive. Therefore, automatically identifying these resources is important to overcome knowledge bottleneck in natural language processing. This paper ...
  • Sithu, Mya; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, a three level resource management system for virtualized data center is presented. Three levels are defined as vitrual machine level controller (VLC), host level controller (HLC) and central level ...
  • Yu, May The; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, an automatic image annotation and retrieval model is developed base on the intensity invariant approach. The given uncaptioned image is divided into background and foreground images and segmented ...
  • Htwe, Khine Khine (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Service composition and integration are well investigated problems in Service Oriented Architecture (SOA). However, they still remain among the hard SOA challenges for which automated approaches have yet to be ...
  • Htet, Thu Thu; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Steganalysis, the method to detect steganographically embedded hidden messages in digital data, has received an increasing interest in recent years. Although significant research efforts have been devoted to develop ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In today digital age, there are more demands to improve techniques for information security. One of the solutions is steganography, hiding sensitive information within innocentlooking cover media. In this paper, we ...

Search Repository



Browse

My Account