UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Sort by: Order: Results:

  • kyaw, Mya Thidar; Soe, Kyi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms ...
  • Myint, Theint Zarni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Recent research has demonstrated the strong performance of hidden Markov models (HMM) applied to information extraction that the text of populating database slots with corresponding phrases from text documents. Hidden ...
  • Nguyen, Tuan Anh; Lee, Seulki; Wi, Miseon; Eom, Taehoon; Park, Jong Sou; Comina, Germán; Bedon, Hector (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Unmanned Airship is useful and applicable for a variety of fields especially in resource exploration and environmental monitoring. This measure enhances the flexibility, on-demand supply and reasonable cost. This is a ...
  • Win, Ngu Wah (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Thein, Yadana; Htike, Theingi (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar printed character s . This paper involves three important ...
  • Paing, Aye Myat Myat; Lwin, Khin Moh Moh; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The availability of IT infrastructures is still a huge challenge nowadays. As server virtualization is used as an essential software infrastructure of various software services in IT environment and it is emerging as ...
  • Nakajima, Hideharu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Corpora must be developed for realizing statistical language models; however, it is labor-intensive work and is very expensive. Often corpora resources are scant for such a domain as new language, new task, and new ...
  • Swe, Minn; Das, Partha Pratim; Htay, Myat Thet Lyar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Optimization is ubiquitous, from industry to engineering design, from scheduling your daily routine to your holiday. In many large organizations, from governments to private companies, management of transferring staffs ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’queries ...
  • Kham, Nang Saing Moon; Thin, Lwin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new ...
  • Wu, Yunong; Kita, Kenji; Matsumoto, Kazuyuki (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this paper, we propose a multi-engine voting system to recognize the multiple emotion states expressed in the Chinese words according to the word identity and the context information, which can better reflect the people's ...
  • Htun, Baby (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The system expects target language output to be grammatically correct within the frame of proper grammatical category. In Myanmar language sentences, it may include ungrammatical word ordered format. So, this paper want ...
  • Wai, Thin Thin; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-12-26)
    Reordering is one of the most challenging and important problems in Statistical Machine Translation. Without reordering capabilities, sentences can be translated correctly only in the case when both languages implied in ...
  • Myint, Khin Swe Swe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data centre virtualization creates an agile environment for application deployment. Applications run within one or more virtual machines and are hosted on various servers throughout the data centre. It improves resource ...
  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Myint, San Hlaing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The main factor in measuring server performance is the accuracy of detection mechanisms. Sever is needed to detect server overload condition accurately. Therefore, it can be satisfied customers by reducing request drop ...
  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-01-28)
    The 'software aging', is characterized by progressive performance degradation due to the exhaustion of operating system resources. Software rejuvenation should be planned and initiated in the face of the actual system ...
  • Thaing, Aye Nwe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Structures that can be represented as graphs are based on graph theory. Graph databases apply graph theory to store information about the relationships between entries in terms of graphs. The study of graph decomposition ...
  • Thu, Ye Kyaw; Finch, Andrew; Sagisaka, Yoshinori; Sumita, Eiichiro (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Myanmar sentences are written as contiguous sequences of syllables with no characters delimiting the words. In statistical machine translation (SMT), word segmentation is a necessary step for languages that do not ...
  • Maung, Su Su; Aung, Nyein Myint Myint (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents the text block segmentation for image search system.Web pages are segmented into blocks for getting the text with images. Text block with images are later used as captions of images and hence plays an ...

Search Repository



Browse

My Account