Ninth International Conference On Computer Applications (ICCA 2011): Recent submissions

  • Zaw, Ei Phyu; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Live migration of virtual machines has been a powerful tool to facilitate system maintenance, load balancing, fault tolerance, and powersaving in clusters or data centers. In pre-copy approach that is mainly used in ...
  • Win, Htwe Pa Pa; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Automatic machine-printed Optical Characters or texts Recognizers (OCR) are highly desirable for a multitude of modern IT applications, including Digital Library software. However, the state of the art OCR systems ...
  • Naing, Win Win; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, the classic technology called cloud computing is very hot topic. It is widely developed in various environments such as information technology, business and medical, etc. Cloud computing platform offers ...
  • Wai, Ei Phyo; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-04-05)
    Face recognition has become one of the most important fields in automated biometric identification system [1].The face is our primary focus of attention in social intercourse, playing a major role in biometric security ...
  • Thandar, Aye Mya (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Several recent machine learning publications demonstrate the utility of using feature selection algorithms in many learning. Feature selection helps to acquire better understanding about the data by telling which the ...
  • Mar, Yi Yi; Nwe, Khine Moe; Maw, Aung Htein (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Range query processing is an essential role in many P2P applications including database indexing, distributed computing and location aware computing and commercial services based on current user’s location. Most of ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The RDF (Resource Description Framework) model has attracted the attention of the database community and many researchers have proposed different solutions to store and query RDF data efficiently. This paper proposes ...
  • Khaing, Cho Cho; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Preventive maintenance combined with disaster recovery planning will help to minimize the hardware and software problems if disaster occurs. Disaster recovery processes involve unplanned interruption of services. ...
  • Thaing, Aye Nwe (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In recent years, graph has become a powerful tool for representing and modeling objects and their relationships in various application domains such as protein interactions, chemical compounds, social networks, XML ...
  • Yee, Thiri The` Wut (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The proliferating numbers of smartphone applications which access device’s functionalities and resources such as GPS, SMS etc imposes security challenges. In the meantime, the existing security and access control mechanism ...
  • Zaw, Sai Maung Maung; Maw, Aung Htein; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In wireless sensor networks (WSNs), energy is a very scarce resource and has to be managed wisely in order to extend the life of the sensors. Therefore, to be energy-efficient, this paper is presented as hybrid protocol ...
  • Theingi, Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    We consider the quantum hydro - dynamic model which describes tunneling of electrons through potential barriers in semiconductor devices. The existence and uniqueness of solutions of the thermal equilibrium states of ...
  • Lin, Nay Yee; Soe, Khin Mar; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Machine Translation Systems expect target language output to be grammatically correct within the frame of proper grammatical category. In Myanmar-English statistical machine translation system, the proposed system concerns ...
  • Wai, Thinn Thinn; Htwe, Tin Myat; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Reordering is important problem to be considered when translating between language pairs with different orders. Our Language, Myanmar is a verb final language and reordering is needed when we translate our language ...
  • Zin, Thet Thet; Soe, Khin Mar; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, we present a translation model of Myanmar phrases for statistical machine translation. Phrase based SMT models have limitations in mapping from the source to target language without using linguistic ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Tint, Yawai; Mya, Khin Than (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The research on blind source separation is focus in the community of signal processing and has been developed in recent years. This paper proposes enhance audio steganalysis technique, which adopts Independent Component ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Kyi, Hsu Mon; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud computing is a scalable distributed computing environment in which a large set of virtualized computing resources, different infrastructures, various development platforms and useful software are delivered as a ...

Search Repository



Browse

My Account