Conferences: Recent submissions

  • Phyu, Hnin Pwint; Nyunt, Thi Thi Soe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software maintainability prediction enables organizations to predict the maintainability of the software systems and can then help in reducing the maintenance effort and thus, reducing the overall cost and time spent ...
  • Lwin, Pwint Hay Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Ranking is a crucial part of information retrieval. Queries describe the users’ search intent and therefore they play an essential role in the context of ranking for information retrieval. The diverse feature impacts ...
  • Mar, Yi Yi; Maw, Aung Htein; Nwe, Khine Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Query processing is an essential role in large scale distributed network application environment including database indexing, distributed computing, location aware services and network monitoring system. In order to ...
  • Htike, Theingi; Thein, Yadana (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Competitive Neural Trees (CNeT) are widely used for classification in pattern recognition. This paper applies this technique for recognizing of Myanmar handwritten characters. This paper involves three important steps, ...
  • Maung, Tin; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents system architecture of a Context and Preference-Aware Location-based Services system (CPALBS, for short), that delivers personalized services to its customers based on the user preference query. ...
  • Thandar, Aye Mya; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In artificial neural networks, the parameters may include the number of layers, the number of hidden units, the activation function and the algorithm parameters such as learning rate for optimization. Many researchers ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Web is one of the most popular and richest sources of information. The source of data for a Web page is generally a relational database which has been recognized as a key factor in generating huge amounts of data ...
  • Hlaing, Thuzar; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is ...
  • Thet, Yi Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Finding all occurrences of a twig pattern query is a core operation of XML query processing system. Many algorithms have been proposed. Existing algorithms generate individual path matches and then stitch them together ...
  • Tint, Yawai; Mya, Khin Than (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting messages hidden using steganography. This paper proposes steganalysis of audio signal using Independent Component Analysis. A detection method is used for detecting ...
  • Htet, Thu Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganalysis is the art and science of detecting a secret communication. Hiding a message will most likely leave detectable traces in the cover medium. The information hiding process changes the statistical properties ...
  • Wah, Naw Lay (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Internet websites are promising as the products for providing services. The key issues related to website engineering are very essential. These websites need to measure and evaluate for quality and for better understanding. ...
  • Nyo, Aye Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Many cryptographic protocols require random or pseudorandom inputs at various points (e.g., for generating digital signatures, or in some authentication protocols). Pseudorandom numbers are critical part of modern ...
  • Aung, Darli Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The facial expression recognition system has been a significant field in human-computer interaction. It is a considerably challenging field to generate an intelligent computer that is able to identify and understand ...
  • Zin, Wai Wai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to advances in technologies, most of the information is kept electronically. Steganography and Cryptography are two popular ways of sending vital information in a secret way. In this paper, an image steganography ...
  • Oo, May Mar; Yi, Aye Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to continuous growth of the Internet technology, it needs to establish security mechanism. However, many current intrusion detection systems (IDSs) are rule-based systems, which have limitations to detect novel ...
  • Oo, May Mar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, network – oriented computing environments require high – performance, distributed database systems that can satisfy both the data consistency control of replica management and data storage requirements ...
  • Shwe, Theint Theint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. Provision of services to users correctly according to their needs is one of the most important ...
  • Htay, Su Su (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Most of online Merchants sites allow customers to write comments about particular product that they have purchased. Customer reviews express opinion about products or service which are collectively referred to as customer ...
  • Phyo, Zar Lwin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The workload in each node changes dynamically over time in large-scale data centers, so the workload in some machines may exceeds the threshold, which not only can’t guarantee the quality of service requirements (QOS), ...

Search Repository



Browse

My Account