UCSY's Research Repository

Tenth International Conference On Computer Applications (ICCA 2012)

Tenth International Conference On Computer Applications (ICCA 2012)

 

Recent Submissions

  • Lwin, Khin Moh Moh (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software failures are now known to be a dominant source of system outages. The cost of unplanned outages is higher than the cost of planned outages. Software systems often experience aging related defects which ...
  • Lin, Nu Nan Dar; Thu, Ye Kyaw; Matsumoto, Mitsuji; Urano, Yoshiyori (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The World Wide Web is an information resource with virtually unlimited potential. However, this potential is relatively untapped because locating relevant information can often be time consuming and fruitless. If ...
  • Aye, Tin Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The explosion of data , its criticality , and business and education ‘s growing dependency on digital information are leading to larger and more complex information storage environments that increasingly combating to ...
  • Tar, Hmway Hmway; Nyunt, Thi Thi Soe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Currently the Internet is the first solution for scholars in finding information. But, analyzing and interpreting this volume of information will lead to researchers overload in pursuing their research. Document clustering ...
  • Yar, Kay Thi (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the great success of web search engines, keyword search has become the most well-liked search model for users. Information retrieval systems have popularized for searching unstructured data by keywords as a query ...
  • Kyaw, Tin Ei (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The hazardous acoustic event classification system is presented and tested in threatening environments. The system is based on classified with Support Vector Machine (SVM), k Nearest Neighbor (kNN) and modeled with ...
  • Zaw, Ei Phyu; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Live virtual machine (VM) migration provides great benefits for load balancing, power management, fault tolerance and other system maintenance issues in modern data centers. VM live migration basically consists ...
  • Hlaing, Nwe Nwe; Nyunt, Thi Thi Soe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The World Wide Web is the main “all kind of information” repository and has been so far very successful in disseminating to humans. As web sites are getting more complicated, the construction of web information ...
  • Khaing, Hnin Su (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the maturity of Geographical Positioning System (GPS), wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and ...
  • Khaing, Cho Cho; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud ...
  • Yee, Thiri The` Wut; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Smartphones are more and more gaining popularity, creating novel application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile applications ...
  • War, Nu Nu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the increased amount of information rapidly available on the World Wide Web, Internet users that want to know opinions about products are becoming difficult to determine which product (entity) is the best on ...
  • Paing, Aye Myat Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Disaster recovery (DR) is an important element of the complex information technology (IT) systems. The availability of the IT for everything, from everywhere, at all time is a growing requirement. Effective IT strategies ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data Centre (DC) administrators try to delivering performance guarantees while managing resources for utilization in terms of reducing cost. With the advent of server consolidation provided by virtualization technology, ...
  • Mon, Ei Ei; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is one of today’s most attractive technology areas due to its many advantages like Highly scalable, on-demand, web-accessed IT resources with major cost / cash and flexibility. In this paper, the ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...
  • Aung, Darli Myint (2012-02-28)
    Facial feature extraction is an essential step in the face detection and facial expression recognition frameworks. To develop a better facial expression recognition system, a good feature extraction method is needed. ...
  • Aye, Chan Myae (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Opinion reviews on products are used by potential customers before deciding to purchase a product. Large volumes of reviews are posted to the Internet and detection of fake reviews is now a challenging research problem. ...
  • Kyi, Hsu Mon; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is deployed a large set of virtualized computing resources in different infrastructures and various development platforms. One of the key challenges in cloud computing system is virtual resources and ...

View more