UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Myint, Thida; Htoon, Ei Chaw; Maw, Aung Htein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Digitization and networked computing in the healthcare sector have resulted in electronic patient records that are stored, managed and shared among different healthcare providers. Replication process enables the data ...
  • Htwe, Lei Yi; Phyu, Aye Lei Lei (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Clustering refers to the grouping of data records, observation or cases into similar objects. A cluster observation or cases similar to one another, and dissimilar to the record in other cluster. Recently, much research ...
  • Khaing, Kyawt Kay; Myint, Mu Mu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In the database management systems, concurrency control is an important problem for the simultaneous execution of transaction over a shared database can create several data integrity and consistency problem. In order ...
  • Lwin, Thuzar; Khaing, Myo Kay (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The client/server method of network communications is the most popular one. Its ease of implementation and scalability make it a good choice in many different kinds of networking environments.A client transaction becomes ...
  • Win, Phyoe Su Su; Mon, Thet Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The general elements of transaction processing are data capture and validation, transaction-dependent processing steps and database maintenance. Database Management Systems (DBMS) are among the most complicated applications. ...
  • Kyi, Khin Myat; Nyunt, Thi Thi Soe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    XML and relational databases are two of the most important mechanisms for storing and transferring data. A reliable and flexible way of moving data between them is very desirable goal. This paper includes comparison ...
  • Thwel, Tin Thein; Thein, Ni Lar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    As the amount of storage utilization become larger and larger, people have been tried to find out the efficient ways to safe storage space. The single instance storage or data deduplication becomes vague in storage ...
  • Hlaing, Htike Ayar; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the current computing community, secure data transfer is limited due to its attack made on data communication. Solutions which came to the rescue are cryptography and steganography. Cryptography is often used in ...
  • Win, Ngu War; Aye, Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Lwin, Yupar Kyaw; Thida, Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A data warehouse uses multiple materialized views to efficiently process a given set of queries. Materialized views selection is one of the crucial decisions in designing a data warehouse for optimal efficiency. The idea ...
  • Khin, KayKay Thi Wut Hmone; Oo, Lwin Lwin (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today, people use widely computer networks to communicate from one place to another. When people use computers, they will need necessary to protect the information and to thwart the hackers. So, people interconnect their ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Win, Swe Zin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Today, many business applications continue the ongoing creation of separated data stores; data mining often requires data integration for those data. This process becomes significant in a variety of situations both ...
  • Myint, Khaing; Oo, Win Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data preprocessing is an important step in the knowledge discover process and quality decisions such as, real-world data which tend to be incomplete, noisy and inconsistent data. The system uses the discretization and ...
  • Nwe, Nann Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data replication is a key technology in distributed systems that enable higher availability and performance. Data replication consists of maintaining multiple copies of data, called replicas, on separate computers. ...
  • Han, Hane Thu; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The role of cryptograph is important for data security. Many cryptographic techniques can be used to keep security of sensitive data. Information is an arm of Military as well as the security of information is it’s life. ...
  • Nwe, Aye Aye; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the ...
  • Swe, Myat Myat; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, technology is moving very fast and is growing demand for the security of data transferring and data collections over the network. To solve the security problems, Cryptography is very useful mechanism not only for ...
  • Pann, Yin Nyein; Kyaw, Nu Yin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    All over the world, as IT technology is increasingly, important services are also becoming more convenient. As a result of it; most of the enterprises are using database system. A distributed database system manages and ...
  • Aung, Han Su; Latt, Yin Ko (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data warehouses collect information from remote sources into a single database. Data Warehouse is created for speed up queries by reducing the volume of data to be scanned. Data warehousing and on line analytical ...

Search Repository



Browse

My Account