UCSY's Research Repository

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Nyunt, Han Su Yin; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Local sequence alignment is widely used to discover structural and hence, functional similarities between biological sequences. Sequence database alignment is among the most important and challenging tasks in bioinformatics. ...
  • Aung, Thet Sandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents the way to calculate waiting times of patients. Results of patient surveys generally cite access to care and delays in care as sources of dissatisfaction. Delays are expensive, not only in terms of ...
  • Kyaw, May Phyu; Yuzana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such modifies have to express organization specific security ...
  • Win, Kyaw San; Kyu, Khin Kyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. ...
  • Thi, Nandar Kay (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    PIC (peripheral Interface Controller) based controlling system is widely used and very popular all over the world. In this system, automatic fire fighting system will be implemented with PIC by using fuzzy logic control. ...
  • Win, Sandar; Kyu, Khin Kyu; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper focuses on the PIC Based Water Level Control system including the complete circuit design. The complete circuit design consists of three major components: PIC (Programmable Interface Controller), AC motor and ...
  • Lin, Nyan; Wai, Khaing Khaing (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is design of PIC-based room temperature control system using ventilation fans. This design is provided with a switch for determining whether the room temperature is increased or decreased. This control system ...
  • Htwe, Nan Myint Myint; Aung, Thu Zar; Win, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper deals with the PIC-circuit implementation of room temperature controller by using PIC16f873. Temperature controller-designed and constructed is PIC–based temperature controller (PIC16F873). In this control system, ...
  • Thein, Hay Mar Hla (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Information is pivotal in today’s business environment. Success is dependent on its early and decisive use. A lack of information is a sure for failure. The rapidly changing environment in which business operates demands ...
  • Thu, Aye Aye; Aye, Zin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Pattern recognition plays an important role in the modern world. It can solve more complex problems and makes human’s job easier. In this paper, we intend to develop a handwritten Postal Codes recognition system that can ...
  • Moe, Khaing Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In our research we use classification using decision tree approach. The Decision Tree is one of the most popular classification algorithms in current use in Data Mining and Machine Learning. According to our experiment ...
  • Aung, Wai Me; Aung, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A project is a temporary endeavor undertaken to create a unique product, or result as the tasks within a project have links between them, all tasks cannot all happen at the same time. A technique entitled Critical Path ...
  • Aye, Khin Myo; Yuzana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Naive Bayes is one of the most efficient and effective inductive learning algorithms for machine learning and data mining. Its competitive performance in classification is surprising, because the conditional independence ...
  • Aung, Thandar; Win, Thin Zar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data Mining is the process of storing through large amount of data and picking out relevant information. Classification can be used as in the form of data analysis that can be used to extract models describing the important ...
  • Han, Aye Mya (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This system presents an efficient approach for discovering significant patterns from the heart disease database for heart attack prediction. The heart disease data warehouse is clustered using Kmeans clustering algorithm ...
  • Lin, May Phyo Wai; Oo, Khine Khine (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The goal of the proposed system is to derive models for forecasting the final price of ongoing auction. The forecasting task is important not only to the participants of an auction who compete against each other for the ...
  • Yi, Win Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is used the various data from Spinning and Weaving Factory (Sarlingyi). The products of factory have four types. There are 1/21 fiber, 1/32 fiber, 1/24 fiber and 1/40 fiber. In this system, the maximum profit ...
  • Hlaing, Ei Phyu; Lwin, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Many people use the internet or the web as a source of information. In an enterprise that uses the internet, a reverse proxy server is a server that acts as an intermediary between a workstation user and internet so that ...
  • Swe, Khin Thet Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents how to get data integrity and authentication in receiver. Signing process is performed in sender and verifying process is performed in receiver. In signing process, sender computes hash value of ...
  • Oo, Aung Nway (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Proxy blind signature, which combines the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original ...

Search Repository



Browse

My Account