UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Sort by: Order: Results:

  • Oladipupo, Bilesanmi Yusuf; Thu, Ye Kyaw; Yoshiyori, Urano (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In recent years, the smart grid has occupied the area of power and grid management research and indeed a lot of brilliant works have been done. Nevertheless, most of these works have been designed only for the improvement ...
  • Thaw, Tin Zar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The eXtensible Markup Language (XML) based web applications are used for data representing, exchanging and storing via internet by the usage of XML standard schema. If XML schema files are difficult to understand ...
  • Khaing, Hnin Su (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the maturity of Geographical Positioning System (GPS), wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and ...
  • Phyo, Zar Lwin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The workload in each node changes dynamically over time in large-scale data centers, so the workload in some machines may exceeds the threshold, which not only can’t guarantee the quality of service requirements (QOS), ...
  • Thu, Soe Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In this paper, content-based music similarity function from acoustic music signal in an efficient way is considered. This function is to determine similarities among songs, particularly, a piece of input music ...
  • Ko, Aye Chan; Aung, Nay Aung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography is the approach for hiding any secret message in a variety of multimedia carriers like text, images, audio or video files. Whenever hiding a secret message, it is very important to make it invisible. This ...
  • Aung, Myintzu Phyo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Noun Phrase Identification is one of the most critical components of natural language processing because information retrieval systems of all kinds rely on base-noun phrase as their primary source of entity ...
  • Zin, Thet Thet; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In statistical machine translation (SMT), the currently best performing systems are based in some way on phrases or word groups. In this paper, phrase-based translation system is described. Translation model and ...
  • Wai, Phyo Phyo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Natural language translation is one of the most important researches carried out in the world of Artificial Intelligent. In any application where a computer has to process natural language, ambiguity is a problem. Many ...
  • Myint, Thida (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Name Entity Recognition (NER) is one of the fundamental problems in many Natural Language Processing applications. NE consists of names, person, location, organization, time, numerical expressions and etc. Not much ...
  • Hlaing, Thuzar; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is ...
  • Aye, The` Seint; Soe, Than Naing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Tar, Hmway Hmway; Nyunt, Thi Thi Soe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Currently the Internet is the first solution for scholars in finding information. But, analyzing and interpreting this volume of information will lead to researchers overload in pursuing their research. Document clustering ...
  • Frank, Lars (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In central databases the consistency of data is normally implemented by using the ACID (Atomicity, Consistency, Isolation and Durability) properties of a DBMS (Data Base Management System). In practice, it is not ...
  • Aye, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The evolution of World Wide Web as the main information source for millions of people nowadays has imposed the need for new methods and algorithms that are able to process efficiently the vast amounts of data that ...
  • Oo, Nandar Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Myanmar language input method editor (IME) is widely used in embedded system of today Android portable devices such as mobile phones, tablets and e-books readers etc. as an important part of human-computer ...
  • Tin, Hlaing May (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Recently, most IT organizations are transforming their data centers to smaller virtualized ones with the help of server virtualization. In virtualized servers, multiple applications are consolidated into a physical server ...
  • Mon, Aye Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Spell checker is an essential component of word processing, Machine Translation system and Office Automation system. Myanmar Pronunciation and orthography has differences because spelling is often not an accurate reflection ...
  • Wah, Naw Lay (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Internet websites are promising as the products for providing services. The key issues related to website engineering are very essential. These websites need to measure and evaluate for quality and for better understanding. ...
  • Myint, San Hlaing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualized server environment, various services are revealed to high rates of incoming requests. The servers may become overloaded during temporary traffic peaks when more requests arrive than the server is considered ...

Search Repository



Browse

My Account