Twelfth International Conference On Computer Applications (ICCA 2014): Recent submissions

  • Thwel, Tin Thein (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As the amounts of storage utilization become the vast, people are being encountered out of storage space in almost every situation. Therefore, they tried to find out the efficient ways to safe storage space. The single ...
  • Khine, May Aye; Wai, Ei Nyein Chan (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Among many types of security techniques, steganography is the one that used to build private communication over the public channel. This paper proposes linguistic steganography system by utilizing lossless compression ...
  • Chui, Chee-Kong; Nguyen, Binh P. (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Computer aided surgery and computer assisted robotic surgery are having more and more impact on medical care. This paper presents the architecture and work flow of an intelligent surgical robotic system that we ...
  • Finch, Andrew; Thu, Ye Kyaw; Tamura, kihiro; Sumita, Eiichiro; Sagisaka, Yoshinori (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Factored machine translation models extend traditionalPhrase Based Statistical Machine Translation (PB-SMT) by taking into account notonly the surface form of the words, but also linguistic knowledge such as the ...
  • Aye, Zin Win; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, as a number of mobile devices are increasing rapidly, each user may use multiple traffics at the same time in wireless environment. The optimal traffic scheduling of mobile networks for multicasting and ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Nguyen, Tuan Anh; Park, Jong Sou (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Virtualization has been considered as an inventive approach for modern information systems in the revolutions of cloud computing and big data. Virtualized systems have been taken into account in research in different ...
  • Maung, Hsu Mon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web application testing is crucial to provide reliable services for the fast growing demand on web application. Testing, designing and generating test cases are challenging task because web application is complex and ...
  • Myint, Khin Khattar; Kham, Nang Saing Moon (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Now day’s security is the primary concerned in the field of computer science.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional ...
  • Thu, Aye Aye; Mya, Khin Than (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Botnets have become one of the major threats on the Internet. They are used to generate spam, carry out DDOS (Distributed Denial of Service) attacks and click-fraud, and steal sensitive information. Nowadays, many ...
  • Naing, May Thu; Thida, Aye (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic text summarization is to compress the larger original text into shorter text called as summary. It is the essential researches for Natural Language Processing (NLP). Automatic semantic analysis of natural ...
  • Myo, Zin Mar; Mon, Myat Thida (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Long Term Evolution (LTE) is a mobile network that operates completely in packet domain. Due to the variation of radio condition in LTE, the obtainable bit rate for active users will vary. The two factors for radio ...
  • Moe, Khaing Cho; Sein, Myint Myint (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Automatic change detection and open space area extraction in urban environment is one of the crucial components towards the efficient updating of Geographic Information System (GIS), government decision-making, urban ...
  • Kyaw, Myat Myitzu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Due to the fast growth of online information on the Internet, there are a large number of journals, magazines, information portals and personal blog sites written in Myanmar language have now online editions. But there ...
  • San, Pan Ei; Aye, Nilar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Web Information Extraction systems becomes more complex and time-consuming. Web page contains many informative blocks and noise blocks. Noise blocks are navigational elements, templates and advertisements that are not ...
  • Hlaing, Yu Wai; Oo, Kyaw May (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Graphs are widely used to model complex structured data. Given a graph query, it is desirable to retrieve graphs quickly from a large database via graph-based indices. In this paper, we propose a graph indexing and ...
  • Phyu, Sabai; Linn, Khaing Wah Wah (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    The web is a large amount of data and difficult to search information or data of user interest (IT academic field). Therefore, it needs to categorize for meet user’s interesting field easily. Web page categorization ...
  • Hsan, Nu War; Phyu, Sabai (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    As World Wide Web is a repository of web pages and links, it provides not only useful information for the Internet users but also becomes delivery platform for searching and surfing day by day. Web personalization is ...
  • Thein, Thin Lai Lai; Nyaung, Dim En (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, online customer reviews become a significant informative resource due to the rapid development of web. In a webpage, the reviews are written in natural language and are unstructuredfree- texts scheme. To ...
  • Aung, Swe Swe; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Nowadays, monitoring road and traffic prediction in urban area is becoming an important role in developing countries like ours. It is the most important part that getting and performing the accurate traffic data in all ...

Search Repository



Browse

My Account