UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Sort by: Order: Results:

  • Aye, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The evolution of World Wide Web as the main information source for millions of people nowadays has imposed the need for new methods and algorithms that are able to process efficiently the vast amounts of data that ...
  • Oo, Nandar Pwint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, Myanmar language input method editor (IME) is widely used in embedded system of today Android portable devices such as mobile phones, tablets and e-books readers etc. as an important part of human-computer ...
  • Tin, Hlaing May (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Recently, most IT organizations are transforming their data centers to smaller virtualized ones with the help of server virtualization. In virtualized servers, multiple applications are consolidated into a physical server ...
  • Mon, Aye Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Spell checker is an essential component of word processing, Machine Translation system and Office Automation system. Myanmar Pronunciation and orthography has differences because spelling is often not an accurate reflection ...
  • Wah, Naw Lay (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Internet websites are promising as the products for providing services. The key issues related to website engineering are very essential. These websites need to measure and evaluate for quality and for better understanding. ...
  • Myint, San Hlaing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualized server environment, various services are revealed to high rates of incoming requests. The servers may become overloaded during temporary traffic peaks when more requests arrive than the server is considered ...
  • Maung, Tin; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents system architecture of a Context and Preference-Aware Location-based Services system (CPALBS, for short), that delivers personalized services to its customers based on the user preference query. ...
  • Mon, Ei Ei; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is one of today’s most attractive technology areas due to its many advantages like Highly scalable, on-demand, web-accessed IT resources with major cost / cash and flexibility. In this paper, the ...
  • Lwin, Khin Moh Moh (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software failures are now known to be a dominant source of system outages. The cost of unplanned outages is higher than the cost of planned outages. Software systems often experience aging related defects which ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Ranking is a crucial part of information retrieval. Queries describe the users’ search intent and therefore they play an essential role in the context of ranking for information retrieval. The diverse feature impacts ...
  • Thandar, Aye Mya; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In artificial neural networks, the parameters may include the number of layers, the number of hidden units, the activation function and the algorithm parameters such as learning rate for optimization. Many researchers ...
  • Thant, Win Win; Htwe, Tin Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This article investigates the use of transformation-based learning for resolving function tagging ambiguity in the Myanmar language. Function tagger plays an important role in natural language applications like ...
  • Murthy, Kavi Narayana; Badugu, Srinivasu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In this paper we analyze the need for Roman Transliteration for Indic scripts. We evaluate the pros and cons of various schemes in use today and argue for a scientifically designed standard scheme. We offer one such ...
  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Nwet, Khin Thandar; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper describes an alignment system that aligns Myanmar-English texts at the sentence and word level in parallel text. Sentence and word level alignment is the identification of the corresponding sentence and word ...
  • Myint, Cynthia (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents a simple rule-based POS tagger to tag the correct syntactic categories of the Myanmar words by applying lexicon based word segmentation and heuristic rule based tagging method. Firstly, input sentence ...
  • Capretz, Luiz Fernando (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software is a word with a fuzzy perception. People who talk about software may be thinking about the structure of a program, the functionality of an application system, the look and feel of an interface or the overall user ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...
  • Kyaw, Win Thuzar; Thein, Ni Lar; Htay, Hla Hla (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    By providing information as the summary, the reader can save time and can easily absorb the main concepts of the articles which are described in digital form. Therefore, automatic text summarization, the process of ...

Search Repository



Browse

My Account