UCSY's Research Repository

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Sin, Ei Ngwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Keyword search technology has been the most widely used querying method nowadays. The amount of data in relational databases is growing rapidly. The information discovery from these databases is necessary for users. Free-form ...
  • Shwe, Theingi; Myo, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The majority of today’s Information Retrieval tasks are based on two main processes: indexing and searching. Indexes and retrieval are at the core of every modern Information Retrieval (IR) System. Many IR systems are based ...
  • Nyein, Phyo Ei; Bo, Aye Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Knowledge-based systems are systems based on the methods and techniques of artificial intelligence. Knowledge-based systems were designed primarily for the purpose of being able to apply knowledge automatically. Knowledge ...
  • Moe, Yadanar; San, Kalyar Myo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Artificial Intelligent (AI) can be considered as tools that emulate human thought to help in solving problems. Knowledge_based system is an important part of Artificial Intelligence. Knowledge_based systems are software ...
  • Aye, Yin Yin; Kyaw, Mya Thida (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Remote sensing data are attractive for deriving land cover information through the image classification. Most of the practical application involves multiclass classification, especially in remote sensing land cover ...
  • Khine, May Aye; Nu, Than Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A linear programming model is built to explore the possibilities of optimizing farm returns, consider-ing crop activities for selected crop region. To deter-mine the optimum organization of crops, three dis-tricts in ...
  • Thuai, Khaing Mar; Thant, Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Decision Tree algorithms are the most popular algorithms for classification in data mining field. The main goal of classification is prediction of the categorical labels (classes). In this system, ID3 algorithm is used to ...
  • Maung, Thiri; Hlaing, Swe Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    As the technology grows rapidly, medical diagnosis reasoning is a very important application area of computer-based system. People take a great interest in computer and then computerbased methods are increasingly used ...
  • Cherry, Hnin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Rough set theory is based on the establishment of equivalence classes within the given training data. All of the data samples forming an equivalence class are indiscernible, that is, the samples are identical with respect ...
  • Swe, Thinn Mya Mya; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In medical applications, domain knowledge may be used to avoid wrong decisions, to be able to make a correct decision for strong working diagnosis and partly for therapeutic purpose. In this paper, the Case Based Reasoning ...
  • Myint, Khaing Mar lar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The World Wide Web information grows explosively in the Internet and people encounter problem to pick some correct things from the overwhelming set of choices. The recommender systems help them choose something they actually ...
  • Phyu, Phyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, people widely use computer networks to communicate from one place to another. Security is needed to protect data from hacker. Cryptography is one of the primary ways to do the job. In cryptography, encryption is ...
  • Oo, Zin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Electronic clocks have predominately replaced the mechanical clocks. They are much reliable, accurate, maintenance free and portable. In general, there are two kinds of electronic clocks. They are analog clock and ...
  • Zin, Thu Thu Zue; Oo, Hlaing Thida (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    PIC control application is widely used and popular in modern elections. The aim of this paper is design and construct the fan speed control system with microcontroller. PIC 16F877 and photo transistor is used for the system. ...
  • Htut, Hla; Oo, Hlaing Thida (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    PIC controlling system is widely used and very popular in industrial control. The aim of this paper is to design Microcontroller based temperature control system and to construct. PIC model 16F877 and LM 35 DZ temperature ...
  • Mon, Pan Myat; Renu; Oo, Thet Lwin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Association rule mining is a process that identifies links between sets of correlated objects in transactional databases where each transaction contains a list of items. Association rule is one of the well-defined algorithms, ...
  • Nwe, Tin Tin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Database mining is the process of extracting interesting and previously unknown patterns and correlations from data stored in Database Management System (DBMS). Association rule mining is the process of discovering items, ...
  • Lynn, Nay Chi; Moe, Khin Myat Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Frequent itemsets mining plays an important part in many data mining tasks. This technique has been used in numerous practical applications, including market basket analysis. This paper presents mining frequent itemsets ...
  • Phyu, Mya Kyar; San, Khaing Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining involves the use of sophisticated data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. Sequential pattern mining is to find all frequent sequential pattern ...
  • Cho, Theingi; khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data communication is an important aspect of our living and protection from data misuse is important. The main security concerns of applications are addressed by cryptography. Cryptographic techniques are extremely critical ...

Search Repository



Browse

My Account