UCSY's Research Repository

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Issue Date

Browsing Twelfth International Conference On Computer Applications (ICCA 2014) by Issue Date

Sort by: Order: Results:

  • Myint, Khin Swe Swe; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Datacenters have been the key system infrastructure for cloud computing. The demand for datacenter computing has increased significantly in recent years resulting in huge energy consumption. Renewable energy resources, ...
  • Mar, Yi Yi; Maw, Aung Htein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Distributed Hash Table (DHT) is a promising approach for building a large data management platform. But it cannot support complex query processing due to its one-dimensional index structure. Complex query processing ...
  • Ohsawa, Yutaka; Hlaing, Aye Thida (Twelfth International Conference On Computer Application (ICCA 2014), 2014-02-17)
    This paper proposes a shortest path search algorithm based on materialized-path-view constructed only on partitioned subgraphs, and its three variations referring different levels of distance materialization. A road ...
  • Theint, Khant Kyawt Kyawt; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The system is aimed to develop the 3D building model of urban area with low resolution satellite images from Google earth that provides to create the three dimensional geographic information systems (GIS). In this ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Lwin, Hnin Thant; Naing, Thinn Thu (2014-02-17)
    The high values of vehicles, the inadequate infrastructure cause traffic congestion. Congested roads can be avoided by determining the travel-time for a particular road ahead of time. Traffic prediction and travel time ...
  • Khaing, Soe Soe; Yin, Zin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The identification of closely connected cores in a complex network has become an important feature in the area of community mining in recent years. According to the network topology, it is true that a large and complex ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Soe, Khin Mar; Htay, Hla Hla; Kyaw, Win Thuzar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic text summarization is used as a tool to help people in reducing the time spent manually extracting the main ideas from text documents. If the natural disaster news is provided as the summary form including important ...
  • Aung, Swe Swe; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, monitoring road and traffic prediction in urban area is becoming an important role in developing countries like ours. It is the most important part that getting and performing the accurate traffic data in all ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Phyu, Sabai; Linn, Khaing Wah Wah (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The web is a large amount of data and difficult to search information or data of user interest (IT academic field). Therefore, it needs to categorize for meet user’s interesting field easily. Web page categorization ...
  • Tint, Yawai; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The goal of steganalysis is to detect and/or estimate potentially hidden information from observed data. Steganalysis not only plays a significant role in information countermeasures, but also can prevent the illicit ...
  • Tun, Amy; Thein, Yadana (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is now attracting significant attention. With a combination of Lifting Wavelet Transform (LWT) ...
  • Phyu, Myat Pwint; Thein, Thandar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As computer systems are taking more and more responsibilities in critical processes, the demand for storage is increasing due to widespread applications. Saving the digital information in a large disk is expensive and ...
  • Oo, Wint War; Khin, Ei Ei (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. The emergence of real-time applications ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...
  • Thein, Thin Lai Lai; Nyaung, Dim En (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, online customer reviews become a significant informative resource due to the rapid development of web. In a webpage, the reviews are written in natural language and are unstructuredfree- texts scheme. To ...
  • Kyaw, Myat Myitzu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Due to the fast growth of online information on the Internet, there are a large number of journals, magazines, information portals and personal blog sites written in Myanmar language have now online editions. But there ...
  • Naing, May Thu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic text summarization is to compress the larger original text into shorter text called as summary. It is the essential researches for Natural Language Processing (NLP). Automatic semantic analysis of natural ...

Search Repository



Browse

My Account