UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Khaing, Cho Cho; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud ...
  • Aye, Htar Htar; Phyu, Kyaw Zar Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Peer to Peer system extends ideas about distributed computing and client server computing, blurring the distinction between clients and servers. The P2P paradigm was recently adopted in the database community to overcome ...
  • Sone, Aye Pyae; Nwe, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web page typically contains many information blocks. They are navigation panels, copyright and privacy notices and advertisements. These blocks are useful for business purposes. These blocks are called as the noisy ...
  • Nandar, Hsu Myat (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Cryptography is one of the most important sciences in the current area. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Nge, Khin Hnin; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper is represented for information security by using cryptography on important message and image steganography method on digital image. The secure system is implemented by combining for the encrypted message and ...
  • Soe, Akari Myint; Cho, Zarli (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The Internet as a whole does not use secure links, thus information in transit may be susceptible to interception as well. The important of reducing a chance of the information being detected during the transmission is ...
  • Thaung, Thein Than; Htike, Win Win (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Steganography is the art of hidden information in other information when communication is taking place. Many different carrier file format can be used, but audio waves are the most difficult and more secure because audio ...
  • Khaing, Thal Ei; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Digital image encryption/decryption is to transform a meaningful image into a meaningless or disordered image in order to enhance the power to resist invalid attack and in turn enhance the security. This paper presents a ...
  • Wai, Hnin Yu; Nwe, Khine Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, it is important that information is sent confidentially over the network without fear of hackers or unauthorized access to it. Cryptography was created as a technique for securing the secrecy of communication ...
  • Khaing, Ei Ei; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Todays, computers security is needed to protect data and to thwart the hackers. Cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable ...
  • San, Thin Thiri; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    MANET (Mobile Ad hoc Network) is self organizing and self configuration and self controlled network without the need of any base station AP(Access Point). Mobility of nodes in MANET causes ever changing topologies. As ...
  • Aung, Tharyar; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In computer science and Web mining which is an interdisciplinary subfield of computer science, is the computational process of discovering patterns in web log files. The overall goal of the web mining process is to ...
  • Cing, Dim Lam; Thwin, Khin Lay (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Case-based Reasoning (CBR) is a recent approach to problem solving and learning that has got a lot of attention over the last few years. CBR is an Artificial Intelligence method based on a plausible cognitive model of human ...
  • Thuzar, Pyae Phyo; Kham, Nang Saing Moon (2017-12-27)
    Multilayer feedforward networks are one of the most used neural networks in various domains because of their universal approximation ability. One of the popular algorithms for training multilayer feedforward network ...
  • Aung, Theint Theint Ei Htet; Thein, Nilar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Information security is becoming more important in data storage and transmission. Because of widely used images in security process, it is the important confidential image data from unauthorized access. The original ...
  • Han, Wai Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The presence of background noise in recorded speech reduces the quality of speech. It can also degrade the performance of other systems, such as speech compression, speech recognition, and speaker authentication. The ...
  • Soe, A Nwe; Myo, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, every organization is needed not only to record but also to manage and analyze a huge amount of data. Data warehouse and OLAP techniques are valuable tools for today’s competitive, fast evolving world. There have ...
  • Aung, Htet Htet (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Artificial neural networks(ANNs) are computing models for information processing and pattern identification. An ANN is a network of many simple computing units called neurons or cells, which are highly interconnected and ...

Search Repository



Browse

My Account