UCSY's Research Repository

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Sort by: Order: Results:

  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Soe, Ei Phyu Phyu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Speech synthesis system is a popular field in natural language processing of computer science for various languages. The process of speech synthesis is to produce the human-like speech from corresponding language and ...
  • Myo, Zin Mar; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Long Term Evolution (LTE) is a mobile network that operates completely in packet domain. Due to the variation of radio condition in LTE, the obtainable bit rate for active users will vary. The two factors for radio ...
  • Aung, Swe Swe; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, monitoring road and traffic prediction in urban area is becoming an important role in developing countries like ours. It is the most important part that getting and performing the accurate traffic data in all ...
  • Moe, Khaing Cho; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic change detection and open space area extraction in urban environment is one of the crucial components towards the efficient updating of Geographic Information System (GIS), government decision-making, urban ...
  • Yu, May Thae; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic image annotation is important to both video and image retrieval and computer object recognition. To ensure easy sharing of an effective searching over a huge and fast growing number of online images, real-time ...
  • Soe, Khin Mar; Htay, Hla Hla; Kyaw, Win Thuzar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic text summarization is used as a tool to help people in reducing the time spent manually extracting the main ideas from text documents. If the natural disaster news is provided as the summary form including important ...
  • Naing, May Thu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic text summarization is to compress the larger original text into shorter text called as summary. It is the essential researches for Natural Language Processing (NLP). Automatic semantic analysis of natural ...
  • Nguyen, Tuan Anh; Park, Jong Sou (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Virtualization has been considered as an inventive approach for modern information systems in the revolutions of cloud computing and big data. Virtualized systems have been taken into account in research in different ...
  • Aung, Tun Tun (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    This paper proposes the common technical architecture framework for eGovernment Interoperability for Myanmar. It also recommends the interaction type/e-Government workflows in common for general e-government services ...
  • Thaing, Aye Nwe (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Graph has become a powerful tool for representing and modeling objects and their relationships in various application domains such as protein interaction, social networks and chemical informatics. With the emergence of ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Cloud Computing is one of the converging technology trends in Information Technology which can pave the way to optimized computing solution. Several research issues exist in these converging technologies. Among them, ...
  • Aye, Kyar Nyo; Thein, Thandar (Twelfth International Conference on Computer Applications (ICCA 2014), 2014-02-17)
    Data rebalancing is one of the most interesting research areas in distributed file systems. In Gluster file system, data among the storage servers are rebalanced after adding a new storage server to the Gluster storage ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Aye, Nyein; Sandi, La Wynn (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    With the rapid increase in multi-user systems, the security issues relating to the password authentication become more and more important. Numerous cryptographic protocols also rely on passwords selected by users ...
  • Sithu, Mya; Ishibashi, Yutaka; Fukushima, Norishige (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In this paper, we handle joint performance of a networked haptic drum system where two users play a drum set in a 3D virtual space with the same rhythm at the same tempo. In order to improve the interactivity, we propose ...
  • Oo, Wint War; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. The emergence of real-time applications ...
  • Thwel, Tin Thein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As the amounts of storage utilization become the vast, people are being encountered out of storage space in almost every situation. Therefore, they tried to find out the efficient ways to safe storage space. The single ...
  • Tun, Thant Zin; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Cloud data centers offer utility-oriented IT services to users worldwide. The nature of resource demand of cloud data centers is elastic as the overall workloads are always changing. For handling dynamic workload nature ...
  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...

Search Repository



Browse

My Account