UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Sort by: Order: Results:

  • Thu, Aye Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Vaish, Abhishek; Jha, Anand Sanjeev Kumar Atul Krishna (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The main area of discussion of our paper “Security of Mobile Agent” is on the host platform attacking the mobile agents. Malicious host is a system in network which can take advantage of a mobile agent. A malicious ...
  • Wadan, Christen Mohamed (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    High biomass consumptions have large social, economic and ecological blessings as well as challenges to contend with. Computing biomass determinations demand renewable and non-renewable energy fact-findings. The study aims ...
  • Naing, Myo Myo Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In information retrieval system, classification of web queries is important to provide search result effectively and efficiently. Web query classification is to classify a web search query into a set of intended categories. ...
  • Min, Nandar Win; Hlaing, Aye Nandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Obtaining important pages rapidly is very useful when a crawler cannot visit the entire Web in a reasonable amount of time. One approach is using focused crawler because it tries to download only pages with pre-defined ...
  • kyaw, Mya Thidar; Soe, Kyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms ...
  • Myint, Theint Zarni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent research has demonstrated the strong performance of hidden Markov models (HMM) applied to information extraction that the text of populating database slots with corresponding phrases from text documents. Hidden ...
  • Nguyen, Tuan Anh; Lee, Seulki; Wi, Miseon; Eom, Taehoon; Park, Jong Sou; Comina, Germán; Bedon, Hector (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Unmanned Airship is useful and applicable for a variety of fields especially in resource exploration and environmental monitoring. This measure enhances the flexibility, on-demand supply and reasonable cost. This is a ...
  • Win, Ngu Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Thein, Yadana; Htike, Theingi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar printed character s . This paper involves three important ...
  • Paing, Aye Myat Myat; Lwin, Khin Moh Moh; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The availability of IT infrastructures is still a huge challenge nowadays. As server virtualization is used as an essential software infrastructure of various software services in IT environment and it is emerging as ...
  • Nakajima, Hideharu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Corpora must be developed for realizing statistical language models; however, it is labor-intensive work and is very expensive. Often corpora resources are scant for such a domain as new language, new task, and new ...
  • Swe, Minn; Das, Partha Pratim; Htay, Myat Thet Lyar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Optimization is ubiquitous, from industry to engineering design, from scheduling your daily routine to your holiday. In many large organizations, from governments to private companies, management of transferring staffs ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’queries ...
  • Kham, Nang Saing Moon; Thin, Lwin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new ...
  • Wu, Yunong; Kita, Kenji; Matsumoto, Kazuyuki (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this paper, we propose a multi-engine voting system to recognize the multiple emotion states expressed in the Chinese words according to the word identity and the context information, which can better reflect the people's ...
  • Htun, Baby (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The system expects target language output to be grammatically correct within the frame of proper grammatical category. In Myanmar language sentences, it may include ungrammatical word ordered format. So, this paper want ...
  • Wai, Thin Thin; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-12-26)
    Reordering is one of the most challenging and important problems in Statistical Machine Translation. Without reordering capabilities, sentences can be translated correctly only in the case when both languages implied in ...
  • Myint, Khin Swe Swe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data centre virtualization creates an agile environment for application deployment. Applications run within one or more virtual machines and are hosted on various servers throughout the data centre. It improves resource ...

Search Repository



Browse

My Account