UCSY's Research Repository

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Browsing Eleventh International Conference On Computer Applications (ICCA 2013) by Title

Sort by: Order: Results:

  • Kham, Nang Saing Moon; Thin, Lwin Mar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new ...
  • Wu, Yunong; Kita, Kenji; Matsumoto, Kazuyuki (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In this paper, we propose a multi-engine voting system to recognize the multiple emotion states expressed in the Chinese words according to the word identity and the context information, which can better reflect the people's ...
  • Htun, Baby (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The system expects target language output to be grammatically correct within the frame of proper grammatical category. In Myanmar language sentences, it may include ungrammatical word ordered format. So, this paper want ...
  • Wai, Thin Thin; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-12-26)
    Reordering is one of the most challenging and important problems in Statistical Machine Translation. Without reordering capabilities, sentences can be translated correctly only in the case when both languages implied in ...
  • Myint, Khin Swe Swe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Data centre virtualization creates an agile environment for application deployment. Applications run within one or more virtual machines and are hosted on various servers throughout the data centre. It improves resource ...
  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Myint, San Hlaing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The main factor in measuring server performance is the accuracy of detection mechanisms. Sever is needed to detect server overload condition accurately. Therefore, it can be satisfied customers by reducing request drop ...
  • Nhway, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-01-28)
    The 'software aging', is characterized by progressive performance degradation due to the exhaustion of operating system resources. Software rejuvenation should be planned and initiated in the face of the actual system ...
  • Thaing, Aye Nwe (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Structures that can be represented as graphs are based on graph theory. Graph databases apply graph theory to store information about the relationships between entries in terms of graphs. The study of graph decomposition ...
  • Thu, Ye Kyaw; Finch, Andrew; Sagisaka, Yoshinori; Sumita, Eiichiro (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Myanmar sentences are written as contiguous sequences of syllables with no characters delimiting the words. In statistical machine translation (SMT), word segmentation is a necessary step for languages that do not ...
  • Maung, Su Su; Aung, Nyein Myint Myint (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    This paper presents the text block segmentation for image search system.Web pages are segmented into blocks for getting the text with images. Text block with images are later used as captions of images and hence plays an ...
  • Aye, Myat Mon; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership ...
  • Aye, Win Cho; Jing, Hsu Wen; Ying, Huang Shell; Hongyang, Sun; Nina, Zhou; Ying, Quan (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Stowage planning is a process of allocating containers onboard the ship taking into consideration of sea-worthy conditions. Moreover, the different ports of discharge, sizes, types, and weight of containers must also ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The Semantic Web is an extension of the current Web that will allow to find, share and combine information more easily. To harvest such power requires robust and scalable data repositories that can store RDF data. Most of ...
  • Myint, Zin Thu Thu; Win, Kay Khaing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Triplet extraction algorithms can assist the web query service in order to translate the unstructured input query to ontology understanding query SPARQL. SPARQL query language has a graph based structure and can be ...
  • Htun, Zarli; Thar, Phyu Phyu (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Social bookmarking websites allow users to store, organize, and search bookmarks of web pages. Users of these services can annotate their bookmarks by using informal tags and other metadata, such as titles, descriptions, ...
  • Phyu, Myat Pwint; Thein, Ni Lar (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Today’s storage systems have a major issue for the long-term storage of massive amounts of unstructured data. Availability and reliability are the basic properties of the most storage system. Replication which is the ...
  • Khaing, Hnin Su; Thein, Thandar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With widespread availability of low cost GPS devices, it is becoming possible to record data about the moving objects on a large scale. The analysis of moving objects trajectory data is a critical component in a wide range ...
  • Htet, Thu Thu; Mya, Khin Than (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Information hiding in video streams with the development of network and multimedia technologies has played an important role in the steganographical field, and correspondingly video stegnanlysis techniques are catching ...
  • Zaw, Ei Phyu; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Live VM migration has been a powerful tool to facilitate system maintenance, load balancing, fault tolerance, and power-saving in data centers. Precopy technique is the best suited approach for live migration. Although ...

Search Repository



Browse

My Account