UCSY's Research Repository

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Sort by: Order: Results:

  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Tin, Lwin Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Information hiding technique is becoming a research hotspot in information security, and will be widely used to national security, e-commerce, egovernment, copyright protection and covert communication. This paper ...
  • Ohsawa, Yutaka; Hlaing, Aye Thida (Twelfth International Conference On Computer Application (ICCA 2014), 2014-02-17)
    This paper proposes a shortest path search algorithm based on materialized-path-view constructed only on partitioned subgraphs, and its three variations referring different levels of distance materialization. A road ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The Semantic Web has been developed in order to publish and access a lot of information for automatically processing of data and information by machines rather than for people. RDF (Resource Description Framework) data ...
  • Aung, Su Nandar; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Spatial databases have been increasingly and widely used in recent years. In order to handle spatial data efficiently, as required in CAD and GIS applications, a spatial database system needs an index mechanism that ...
  • Tun, Khin Mo Mo; Thein, Htet Thazin Tike (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. In this paper, the adaptation of network ...
  • HarmokoSaputro, Adhi; Mustafa, Mohd. Marzuki; Hussain, Aini (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A computer-based of cardiac diagnosis system is needed to assist a cardiologist to evaluate the coronary artery disease quantitatively. In this paper, a computer-based global and regional diagnosis is developed to ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...
  • Htike, Theingi; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Neural network classifier methods and decision trees are widely used in various pattern recognition research areas. Among them, printed character recognition still faces some issues in all languages. Myanmar sentences ...
  • Mar, Yi Yi; Maw, Aung Htein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Distributed Hash Table (DHT) is a promising approach for building a large data management platform. But it cannot support complex query processing due to its one-dimensional index structure. Complex query processing ...
  • Nway, Zon Nyein; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Physical activity is an essential component of a healthy lifestyle. It is clear that physically active people have a lower disease risk than sedentary individuals. Thus the measurement for physical fitness becomes the ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (2014-02-17)
    The high values of vehicles, the inadequate infrastructure cause traffic congestion. Congested roads can be avoided by determining the travel-time for a particular road ahead of time. Traffic prediction and travel time ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In information retrieval, the users’ queries often vary a lot from one to another. Most IR systems use a single fixed ranking strategy to support the information seeking task of all users for all queries irrespective ...
  • Kyaw, Myat Myitzu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Due to the fast growth of online information on the Internet, there are a large number of journals, magazines, information portals and personal blog sites written in Myanmar language have now online editions. But there ...
  • Myint, Theint Zarni; Khaing, Myo Kay (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Many application environments have already used speech interface. But the low speech recognition rate makes it difficult to extend its application to new fields. In the human-computer interaction through spoken dialogue ...
  • Phyu, Hnin Pwint; Nyunt, Thi Thi Soe (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    In maintenance of object-oriented software, one of the most important concepts is inheritance, which organizes classes into a hierarchy. The relationships among packages, classes, access modifiers, inherited classes ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    XML (eXtensible Markup Language) and its schema language are becoming a primary data exchange format on the current web. In the next generation of the Semantic Web, the drawbacks of XML and its schema are appeared. ...
  • Aye, Zin Win; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, as a number of mobile devices are increasing rapidly, each user may use multiple traffics at the same time in wireless environment. The optimal traffic scheduling of mobile networks for multicasting and ...

Search Repository



Browse

My Account