UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Mar, Aye Aye; Aung, Nang Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Dijkstra algorithm among the shortest-path algorithms is to solve the shortest-path problem. Dijkstra’s algorithm is probably the best-known and thus most implemented shortest path algorithm. It is based on a priority queue ...
  • Win, Soe Theint Theint; Aung, Khin Sandar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Clustering (or cluster analysis) aims to organize a collection of data items into clusters, such that items within a cluster are more “similar” to each other than they are to items in the other clusters.Clustering is ...
  • Tha, Phone Kyi; Win, Su Thawda (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    In a capacitated pipeline network, a problem that commonly occurred is finding maximum flow. It is finding the best amount of flow of flow rate of entity in the pipeline network. Water supply network is a kind of capacitated ...
  • Phyu, Nan Khaing Pwint; Aung, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Outlier analysis is that the user do depends on the kinds data they have. An outlier is a data value, that has a very low probability of occurrence that is, it is unusual. There are three kinds of outlier detection in ...
  • Hlaing, Wint Wah; Khin, Tar Tar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Outlier detection is an important task in data mining activities and has much attention in both research and application. A value that lies outside which is much smaller or larger than most of the other value in a set of ...
  • Htwe, Hsu Mon; Phyu, Aye Lei Lei (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Outliers are the set of objects that are considerably dissimilar from other values in a random sample from a population. Outliers are important because they can change the results of data analysis. In this paper, ...
  • Htwe, Ei Ei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Clustering is the process of grouping a set of objects into classes or clusters so that objects within a cluster have similarity in comparison to one another, but are dissimilar to objects in other clusters. Clustering ...
  • Htun, Nay Win; Ko, Lin Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents a feature-based system which utilizes domain knowledge to segment and classify scanned image documents. Documents usually consists of a mixture of text and image. Text block possesses an interesting ...
  • Nyein, May Khine; Khaing, Myo (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Graphs are widely used in many applications. Some of the applications that used graph theory are: analysis of electrical circuits, route planning, genetics, social sciences and so on. The system is based on sequential ...
  • Nyunt, Han Su Yin; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Local sequence alignment is widely used to discover structural and hence, functional similarities between biological sequences. Sequence database alignment is among the most important and challenging tasks in bioinformatics. ...
  • Aung, Thet Sandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents the way to calculate waiting times of patients. Results of patient surveys generally cite access to care and delays in care as sources of dissatisfaction. Delays are expensive, not only in terms of ...
  • Kyaw, May Phyu; Yuzana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such modifies have to express organization specific security ...
  • Aung, Thazin; Tun, Ei Ei Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Steganographic techniques allow one party to communicate information to another without a third party knowing that the communication is occuring. Steganography works by replacing bits of useless or unused data in regular ...
  • Phyo, Zin Mar; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Mobile Ad hoc Network (MANET) is a collection of mobile devices and is selfconfiguring, dynamically changing, multi-hop wireless network which forms a communication network via multi hop wireless network connection, ...
  • Hlaing, Nwe Ni; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Spam is a key problem in electronic communication, including large-scale email systems. Classification of spam emails is a significant operation in email system. The efficiency of this process is determined by many ...
  • Myint, Moe Moe; Kyu, Khin Kyu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Image information is routinely used in many applications. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays an important role in protecting ...
  • Win, Kyaw San; Kyu, Khin Kyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. ...
  • Hlaing, Thazin; Pearl (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Personalization is a new system development approach for designing information systems that change configurations based on each user's needs and preferences. If it is possible to recommend products to customers’ liking at ...
  • Linn, Khaing Wah Wah; Thwin, Khin Lay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Personalization systems compute recommendations based on user information. There are many kinds of personalization techniques such as collaborative filtering, content-based filtering, rulebased approach etc. Collaborative ...
  • Thi, Nandar Kay (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    PIC (peripheral Interface Controller) based controlling system is widely used and very popular all over the world. In this system, automatic fire fighting system will be implemented with PIC by using fuzzy logic control. ...

Search Repository



Browse

My Account