UCSY's Research Repository

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Title

Sort by: Order: Results:

  • Maw, Kyi Kyi; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Certified email protocols to facilitate secure electronic mail delivery are necessary if the Internet is to achieve its true potential as a communications tool. So, the proposed system is aimed to provide a certified ...
  • Phyu, Myat Pwint; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As computer systems are taking more and more responsibilities in critical processes, the demand for storage is increasing due to widespread applications. Saving the digital information in a large disk is expensive and ...
  • Khaing, Soe Soe; Yin, Zin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The identification of closely connected cores in a complex network has become an important feature in the area of community mining in recent years. According to the network topology, it is true that a large and complex ...
  • Hsan, Nu War; Phyu, Sabai (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As World Wide Web is a repository of web pages and links, it provides not only useful information for the Internet users but also becomes delivery platform for searching and surfing day by day. Web personalization is ...
  • Finch, Andrew; Thu, Ye Kyaw; Tamura, kihiro; Sumita, Eiichiro; Sagisaka, Yoshinori (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Factored machine translation models extend traditionalPhrase Based Statistical Machine Translation (PB-SMT) by taking into account notonly the surface form of the words, but also linguistic knowledge such as the ...
  • Thein, Thin Lai Lai; Nyaung, Dim En (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, online customer reviews become a significant informative resource due to the rapid development of web. In a webpage, the reviews are written in natural language and are unstructuredfree- texts scheme. To ...
  • Hlaing, Yu Wai; Oo, Kyaw May (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Graphs are widely used to model complex structured data. Given a graph query, it is desirable to retrieve graphs quickly from a large database via graph-based indices. In this paper, we propose a graph indexing and ...
  • Myint, Khin Swe Swe; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Datacenters have been the key system infrastructure for cloud computing. The demand for datacenter computing has increased significantly in recent years resulting in huge energy consumption. Renewable energy resources, ...
  • Chui, Chee-Kong; Nguyen, Binh P. (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Computer aided surgery and computer assisted robotic surgery are having more and more impact on medical care. This paper presents the architecture and work flow of an intelligent surgical robotic system that we ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Now day’s security is the primary concerned in the field of computer science.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Tin, Lwin Mar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Information hiding technique is becoming a research hotspot in information security, and will be widely used to national security, e-commerce, egovernment, copyright protection and covert communication. This paper ...
  • Ohsawa, Yutaka; Hlaing, Aye Thida (Twelfth International Conference On Computer Application (ICCA 2014), 2014-02-17)
    This paper proposes a shortest path search algorithm based on materialized-path-view constructed only on partitioned subgraphs, and its three variations referring different levels of distance materialization. A road ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The Semantic Web has been developed in order to publish and access a lot of information for automatically processing of data and information by machines rather than for people. RDF (Resource Description Framework) data ...
  • Aung, Su Nandar; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Spatial databases have been increasingly and widely used in recent years. In order to handle spatial data efficiently, as required in CAD and GIS applications, a spatial database system needs an index mechanism that ...
  • Tun, Khin Mo Mo; Thein, Htet Thazin Tike (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. In this paper, the adaptation of network ...
  • HarmokoSaputro, Adhi; Mustafa, Mohd. Marzuki; Hussain, Aini (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A computer-based of cardiac diagnosis system is needed to assist a cardiologist to evaluate the coronary artery disease quantitatively. In this paper, a computer-based global and regional diagnosis is developed to ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...
  • Htike, Theingi; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Neural network classifier methods and decision trees are widely used in various pattern recognition research areas. Among them, printed character recognition still faces some issues in all languages. Myanmar sentences ...

Search Repository



Browse

My Account