UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Issue Date

Browsing International Conference on Computer Applications (ICCA) by Issue Date

Sort by: Order: Results:

  • Win, Zin Mar; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Fingerprint-based identification is one of the core methodologies for personal identification. It remains a reliable, efficient and commonly accepted biometric. We propose a fingerprint recognition system for identifying ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Mar, Khin Thet (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A PIC microcontroller is a main processor to generate four types of waveforms. This device has two channels output which not only provides user’s editable waveform (sine, square, triangular, sawtooth etc) but also ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A relational database is often operated by means of a structured query language (SQL). When composing SQL-queries one must have an understanding of the SQL syntax to be able to produce a query the database can ...
  • Aye, Chan Myae (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Assessing the trustworthiness of reviews is a key issue for the maintainers of opinion such as Amazon.com. Opinion reviews on products and services are used by potential customers before deciding to purchase a product. ...
  • Tun, Amy; Thein, Yadana (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    As a protection against unauthorized copying of digital multimedia objects, digital watermarking technology is now attracting substantial attention. In this paper, an image watermarking algorithm is presented by ...
  • Hlaing, Thuzar; Khine, May Aye (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    To avoid high computational costs in identifying intrusions by IDSs, the size of a dataset needs to be reduced. Feature selection is considered a problem of global combinatorial optimization in machine learning, which ...
  • Sithu, Mya; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, a three level resource management system for virtualized data center is presented. Three levels are defined as vitrual machine level controller (VLC), host level controller (HLC) and central level ...
  • Win, Myint Myint; Thein, Ni Lar (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Manually produced lexical resources are time-consuming and labour-intensive. Therefore, automatically identifying these resources is important to overcome knowledge bottleneck in natural language processing. This paper ...
  • Soe, The` The` (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A variety of Verb Phrase exists in Myanmar Language including Simple Verb Phrase, Compound Verb Phrase and so on. This paper explains the feature of Myanmar Verb Phrase and English Verb Phrase. And then, the system ...
  • Hlaing, Pa Pa (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Data centers have become the nextgeneration computing platforms for enterprises and Internet users. This is primarily due to the economic and technical advantages of resource sharing in data centers. By sharing ...
  • Saw, Mya Thet (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The main objective of this paper is to implement a control unit for the 16 bit CPU used in Microprocessor Trainer. In Microprocessor Trainer, there are six modules and they are connected by the address bus (A [0...15]), ...
  • Su, Ei Thin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    This paper managed to propose robust audio data hiding through optimization-based problem transformation method, Probabilistic Global Search Lausanne Algorithm (PGSL) in modified discrete cosine transform (MDCT) ...
  • Aye, Yin Nyein; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud computing is an emerging computing paradigm in which applications, data and IT resources are provided as a service to users over the Internet. One kind of services that can be offered through the cloud is Software ...
  • Kim, Chang Soo; Won, Won Seok; Park, Man Gon; Rhee, Kyung Hyune; Kim, Young Seup (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Heavy rains have caused an amount of damage from flooding and landslides nationwide. Specially, because of flooded road when disasters occurred, traffic congestion and isolation have caused many losses to drivers during ...
  • Shwe, Theint Theint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    World Wide Web overwhelms us with the immense amounts of widely distributed interconnected, rich and dynamic information. As a consequence of this, Web Usage Mining becomes one of the popular research areas. It involves ...
  • Yu, May The; Sein, Myint Myint (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    In this paper, an automatic image annotation and retrieval model is developed base on the intensity invariant approach. The given uncaptioned image is divided into background and foreground images and segmented ...
  • Wah, Naw Lay (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    A Web site interface is a complex mix of text, links, graphic elements, formatting and other aspects that affect the site’s overall quality. The concepts of traditional software engineering usability guidelines can be ...
  • Hnin, Win Lai; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The Semantic Web, which represents a web of knowledge, offers us new opportunities to search for knowledge and information. To harvest such search power requires robust and scalable data repositories that can store RDF ...
  • Kyaw, Tin Ei (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The surveillance system at important public places in a noisy environment deals with audio events detection is essential and useful application. At surveillance systems aiming to detect abnormal situations based on ...

Search Repository



Browse

My Account