UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Issue Date

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Issue Date

Sort by: Order: Results:

  • Thaw, Tin Zar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The eXtensible Markup Language (XML) based web applications are used for data representing, exchanging and storing via internet by the usage of XML standard schema. If XML schema files are difficult to understand ...
  • Aye, Tin Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The explosion of data , its criticality , and business and education ‘s growing dependency on digital information are leading to larger and more complex information storage environments that increasingly combating to ...
  • Aye, The` Seint; Soe, Than Naing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Ranking is a crucial part of information retrieval. Queries describe the users’ search intent and therefore they play an essential role in the context of ranking for information retrieval. The diverse feature impacts ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the great success of web search engines, keyword search has become the most well-liked search model for users. Information retrieval systems have popularized for searching unstructured data by keywords as a query ...
  • Aung, Nay Aung; Ko, Aye Chan (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, steganography plays a critical role in Information Security. A number of steganographic algorithms have been proposed by focusing on this property of a steganographic system. It is needed two bytes to hide ...
  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In client-server type, due to repeated and potentially faulty usage of long running server is requested by many clients, such software "ages" with time and eventually fails. We show that virtualization promotes a new ...
  • Htwe, Thandar Su Nge (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Grid has emerged recently as an integration infrastructure for sharing and coordinated use of diverse resources in dynamic, distributed environment. OGSA-DAI (Open Grid Services Architecture Data Access and integration) ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper makes a comparative study of the Extended Great Deluge (EGD) based hype heuristic (HH) for the university exam timetabling problem. Indeed, Hyper-Heuristic is not new in AI field. It is an emerged ...
  • Melinamath, Bhuvaneshwari C (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper explores a computational model for Kannada nouns. This is a single tool performing analysis and generation in reverse direction. Kannada has rich morphology with inflections -vibhakti, derivations and ...
  • Khaing, Hnin Su (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the maturity of Geographical Positioning System (GPS), wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and ...
  • Myint, Thida (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Name Entity Recognition (NER) is one of the fundamental problems in many Natural Language Processing applications. NE consists of names, person, location, organization, time, numerical expressions and etc. Not much ...
  • Lwin, Myint Myint; Nyunt, Thi Thi Soe; Yuzana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data exchanging is involving as an important role in the Web application and Extensible Markup Language (XML) is also accepted as the standard for exchanging information between the heterogeneous systems. The XML schema ...
  • Yee, Tin Tin; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure. Cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Ant Colony Optimization (ACO) is a metaheuristic algorithm used for combinatorial optimization problems. It is a good choice for many hard combinatorial problems because it is more efficient and produces better ...
  • Yee, Thiri The` Wut; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Smartphones are more and more gaining popularity, creating novel application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile applications ...
  • War, Nu Nu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the increased amount of information rapidly available on the World Wide Web, Internet users that want to know opinions about products are becoming difficult to determine which product (entity) is the best on ...
  • Kyaw, Tin Ei (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The hazardous acoustic event classification system is presented and tested in threatening environments. The system is based on classified with Support Vector Machine (SVM), k Nearest Neighbor (kNN) and modeled with ...
  • Myint, Khin Swe Swe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Virtualization techniques provide the carving individual physical servers into multiple virtual containers that can be run and managed separately. However, due to the uncertainty of workload variation, the workloads ...

Search Repository



Browse

My Account