UCSY's Research Repository

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Sort by: Order: Results:

  • Hlaing, Yu Wai; Oo, Kyaw May (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Graphs are widely used to model complex structured data. Given a graph query, it is desirable to retrieve graphs quickly from a large database via graph-based indices. In this paper, we propose a graph indexing and ...
  • Myint, Khin Swe Swe; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Datacenters have been the key system infrastructure for cloud computing. The demand for datacenter computing has increased significantly in recent years resulting in huge energy consumption. Renewable energy resources, ...
  • Chui, Chee-Kong; Nguyen, Binh P. (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Computer aided surgery and computer assisted robotic surgery are having more and more impact on medical care. This paper presents the architecture and work flow of an intelligent surgical robotic system that we ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Now day’s security is the primary concerned in the field of computer science.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Tin, Lwin Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Information hiding technique is becoming a research hotspot in information security, and will be widely used to national security, e-commerce, egovernment, copyright protection and covert communication. This paper ...
  • Ohsawa, Yutaka; Hlaing, Aye Thida (Twelfth International Conference On Computer Application (ICCA 2014), 2014-02-17)
    This paper proposes a shortest path search algorithm based on materialized-path-view constructed only on partitioned subgraphs, and its three variations referring different levels of distance materialization. A road ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The Semantic Web has been developed in order to publish and access a lot of information for automatically processing of data and information by machines rather than for people. RDF (Resource Description Framework) data ...
  • Aung, Su Nandar; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Spatial databases have been increasingly and widely used in recent years. In order to handle spatial data efficiently, as required in CAD and GIS applications, a spatial database system needs an index mechanism that ...
  • Tun, Khin Mo Mo; Thein, Htet Thazin Tike (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. In this paper, the adaptation of network ...
  • HarmokoSaputro, Adhi; Mustafa, Mohd. Marzuki; Hussain, Aini (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A computer-based of cardiac diagnosis system is needed to assist a cardiologist to evaluate the coronary artery disease quantitatively. In this paper, a computer-based global and regional diagnosis is developed to ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...
  • Htike, Theingi; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Neural network classifier methods and decision trees are widely used in various pattern recognition research areas. Among them, printed character recognition still faces some issues in all languages. Myanmar sentences ...
  • Mar, Yi Yi; Maw, Aung Htein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Distributed Hash Table (DHT) is a promising approach for building a large data management platform. But it cannot support complex query processing due to its one-dimensional index structure. Complex query processing ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Physical activity is an essential component of a healthy lifestyle. It is clear that physically active people have a lower disease risk than sedentary individuals. Thus the measurement for physical fitness becomes the ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (2014-02-17)
    The high values of vehicles, the inadequate infrastructure cause traffic congestion. Congested roads can be avoided by determining the travel-time for a particular road ahead of time. Traffic prediction and travel time ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In information retrieval, the users’ queries often vary a lot from one to another. Most IR systems use a single fixed ranking strategy to support the information seeking task of all users for all queries irrespective ...
  • Kyaw, Myat Myitzu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Due to the fast growth of online information on the Internet, there are a large number of journals, magazines, information portals and personal blog sites written in Myanmar language have now online editions. But there ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Many application environments have already used speech interface. But the low speech recognition rate makes it difficult to extend its application to new fields. In the human-computer interaction through spoken dialogue ...

Search Repository



Browse

My Account