UCSY's Research Repository

Browsing Conferences by Issue Date

Browsing Conferences by Issue Date

Sort by: Order: Results:

  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Htet, Lwin; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There ...
  • Aung, Pyae Phyo; Soe, Khin Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system develops an intelligent search mechanism among large amount of distributed data on a Peerto- Peer network. To illustrate the intelligent search mechanism, the system builds a decentralized newspaper application. ...
  • Than, Myo Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In computer and network systems, the private access systems use cryptosystems that provide to certain and ensure data of information that are authentic and secure. This paper will develop the secure bank transaction ...
  • Zodingliana (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptograph is crucial to communicating medium. The use of cryptography today becomes widespread, not just in military situation but for commercial and private purposes. So the electronic messages and documents which ...
  • Htein, Aung Thet (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Data mining is process of pattern extraction from a large collection of datasets.Main goal of data mining is to discover the frequent itemsets(patterns).Sequential pattern mining is an important data mining problem that ...
  • Latt, Tin Mg (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents a method for detection of ECG QRS complexes using signal energy. This system reliably recognizes QRS complexes based upon digital analyses of slope, amplitude, and width. In order to reduce false ...
  • Lwin, Pyae Phyo; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Intelligent control of home appliances has attracted much theoretical attention, as well as becoming a major factor for industrial and economic success and rapid market penetration. A fuzzy control that uses rules based ...
  • Soe, Naing Thura; Thant, Khin Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Dijkstra’s Algorithm solves the problem of finding the shortest path from a point (the source) to a destination. This problem is sometimes called the single-source shortest path problem. In these days, the world become ...
  • Khin, KayKay Thi Wut Hmone; Oo, Lwin Lwin (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today, people use widely computer networks to communicate from one place to another. When people use computers, they will need necessary to protect the information and to thwart the hackers. So, people interconnect their ...
  • Oo, Thane Sat; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The World Wide Web has grown from a few thousand pages to billion of pages at present. Due to this explosion in size, web search systems are becoming increasingly important as the primary means of locating relevant ...
  • Kyi, Ye Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence is defined generally as the attempt to construct mechanisms that performed by humans. The knowledge base contains knowledge necessary for understanding, formulating, and solving problems. This ...
  • Aye, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is an important field of study for most day-to-day transactions. Cryptography standards are needed to create interoperability in the transformation security world. Cryptography mechanism is based on ...
  • Kyaw, Thein Gi; Tun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Expert System is a high performance problem solving capable of simulating human expertise in domain. A case-based reasoning (CBR) is an approach that allows one to solve a new problem using or adapting a solution of ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Tun, Thurein; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The propose system intends to implement the Email security system using RC5, BBS and RSA algorithms to encrypt and decrypt of messages. It also intends to analysis the symmetric key algorithm , public key algorithm , ...
  • Aung, Yin Pa Pa; Htoo, Nay Zar Chi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptography makes secure websites and electronic safe transmission possible. For a web site to be secure all of the data transmitted between the computers where the data is kept and where it is received must be encrypted. ...
  • Myint, Yuzana; Swe, Ei Mon Mon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper describes the work done on the development of an audio classification system. Audio recordings are classified into basic audio types such as speech or music. Audio classification is processed in two parts, ...
  • Naing, Tint Htoo; Nge, Mi Mi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-base Reasoning (CBR) is an artificial intelligent approach to learn and solve the problem emphasizes the role of prior experience. Case-base reasoning methods have to deal with the current problem to identify the ...
  • Maung, Arkar Aye; Hole, Gilmour (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, everybody is facing many problems with making decisions and future planning in current topic in global and regional works all over the world. However, problems for the multiple criteria decision- making are ...

Search Repository



Browse

My Account