UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Sort by: Order: Results:

  • Gruenwald, Hermann (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper focuses on the large scale implementation of information systems in ASEAN. We use the complexity of the Hospital Information System (HIS) to gather lessons learned from a stakeholders’ perspective through ...
  • Sithu, Mya (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the advent of virtualization technology, multiple heterogeneous virtual machines (VMs) can be coexisted on a physical server. Dynamic allocation of server’s resources prevents over provisioning and under provisioning ...
  • Aung, Ohnmar; Thein, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases (middle ...
  • Khin, Ei Ei; Phyu, Thandar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    A mobile ad-hoc network (MANET) is an autonomous wireless system which consists of several mobile nodes to form an arbitrary and temporary network. As the lack of infrastructure network, MANETs are facing various severe ...
  • Maw, Tin Win; Zaw, Myo Hein (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today’s world is experiencing many natural disasters like earthquakes, flooding, Tsunamis and forest firing, etc. Therefore, it is not only necessary to use widely Wireless Sensor Networks in the hostile environments all ...
  • Soe, Wunna (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent advances in web and mobile computing technologies provide users with a vast amount of information and services such as online news, weather forecasting news, shopping, banking, music, movies, and online games. The ...
  • Khaing, Myo; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Feature selection is often an essential data processing step prior to applying a learning algorithm. The removal of irrelevant and redundant information improves the performance of machine learning algorithms. In this ...
  • Mon, Aye Myat; Thein, Thandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02)
    In Myanmar Language, Pronunciation and orthography has differences because spelling is often not an accurate reflection of pronunciation. Pronunciation of a word may lead to misspelling. In this paper, we present Myanmar ...
  • Hlaing, Pa Pa (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Energy consumption of data centers has been increasing continuously due to rising demands of computational power. One promising approach of reducing this energy consumption is the consolidation of servers by virtualization. ...
  • Thu, Aye Aye (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today web site hacks are on the rise and pose a greater threat than the broad-based network attacks as they threaten to steal critical customer, employee, and business partner information stored in applications and databases ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Vaish, Abhishek; Jha, Anand Sanjeev Kumar Atul Krishna (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The main area of discussion of our paper “Security of Mobile Agent” is on the host platform attacking the mobile agents. Malicious host is a system in network which can take advantage of a mobile agent. A malicious ...
  • Wadan, Christen Mohamed (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    High biomass consumptions have large social, economic and ecological blessings as well as challenges to contend with. Computing biomass determinations demand renewable and non-renewable energy fact-findings. The study aims ...
  • Naing, Myo Myo Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In information retrieval system, classification of web queries is important to provide search result effectively and efficiently. Web query classification is to classify a web search query into a set of intended categories. ...
  • Min, Nandar Win; Hlaing, Aye Nandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Obtaining important pages rapidly is very useful when a crawler cannot visit the entire Web in a reasonable amount of time. One approach is using focused crawler because it tries to download only pages with pre-defined ...
  • kyaw, Mya Thidar; Soe, Kyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms ...
  • Myint, Theint Zarni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent research has demonstrated the strong performance of hidden Markov models (HMM) applied to information extraction that the text of populating database slots with corresponding phrases from text documents. Hidden ...
  • Nguyen, Tuan Anh; Lee, Seulki; Wi, Miseon; Eom, Taehoon; Park, Jong Sou; Comina, Germán; Bedon, Hector (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Unmanned Airship is useful and applicable for a variety of fields especially in resource exploration and environmental monitoring. This measure enhances the flexibility, on-demand supply and reasonable cost. This is a ...
  • Win, Ngu Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Thein, Yadana; Htike, Theingi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar printed character s . This paper involves three important ...

Search Repository



Browse

My Account