UCSY's Research Repository

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Aye, YinYin; Thant, Khin Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The concurrency control of a distributed system is to ensure that the consistency of the database. The concurrency control mechanism is becoming useful in the ordering system. This paper introduces a concurrency control ...
  • Kyi, May Thynn; Kham, Nan Si (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Many in top managements extremely need high quality information for various time periods. Most organizations are facing some problems concerning data information gap. Decision support data usually needs to be collected ...
  • Thura, Kyaw; Kyu, Khin Kyu; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is intended for changing the satellite communication link and design to proper and more secure link and design. This paper demonstrate about the current technologies using in satellite and compare with new ...
  • San, Khine Aye; Thein, Thin Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper implements the waiting line of clinic by using Queuing Theory to save the time-limit. The system is using the multiple queue line. One is for emergent patients, one is for old patients, another one is for new ...
  • Aye, Nang Yupar; Aung, Nang Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper studies Searching Methods. Among the searching methods, this system emphasized the hill climbing. Hill climbing tries to expand the node closet to the goal; it evaluates nodes by using heuristics method. This ...
  • Wun, Ei Mon Thu; Phyu, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper describes secure transaction of credit card system. The credit card requires the provision of purchaser’s credit card details to the service provider for goods and services purchased over the network. Therefore, ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...
  • Mon, Kaung Myat; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it ...
  • Aung, Cho Cho; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is ...
  • Myint, May Thu; Renu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is an important thing that needs to transport data from location to another safely. Therefore, many models and systems are looking for an ideal method to provide a secure environment for better of the ...
  • Mon, Aye Aye; Mar, Khin Thet (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today’s connected society requires secure information system to preserve data privacy and authentication in critical applications. This paper intends to implement secure web development system for critical applications. ...
  • Aung, Wai Zin; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to existential forgeries requires redundancy ...
  • Phyu, Ei Ei; Moe, Khin Myat Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The demand of security is getting higher in these days due to easy reproduction of digitally created data. Digitally hide the secret information in some media content like digitized identification card, student’s registration ...
  • Tun, Khin Myaing Myaing; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is recognized as an absolute need in application development. The healthcare sector deals with very sensitive data, patient’s medical records need to be kept confidential; hence, security is very important. ...
  • Tun, Thu Thu; Htoo, Nay Zar Chi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The Web is moving toward a collection of interoperating Web Services. Achieving this interoperability requires dynamic discovery of Web Services. This paper will develop a service repository that extends the UDDI registries ...
  • Hlaing, Khin Su; Tun, Ei Ei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The rising popularity of electronic commerce makes data mining an indispensable technology for several applications, especially online business competitiveness. The World Wide Web provides abundant raw data in the form of ...
  • Wai, Thiri; Thaung, Htay Htay (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Traveling is the part of every person’s day-to-day life. Dijkstra’s algorithm can be used to find the shortest route between one city and all other cities. This paper proposes, when the user gives any road map as input, ...
  • Aye, Hun (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Names are the most important as they are used in many process, such as identifying of people. Names are stored within large information system includes government, medical, educational, and even commercial records which ...
  • Aung, Nway Htet Htet; Mar, Soe Hay (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, there is describing a similarity-based retrieval framework that addresses the challenges associated with the relational database text documents. This system proposed to automatically classify documents based ...
  • Wai, Khin San; Htun, Moe Sanda (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Multiprogramming is used to improve the efficiency of the micro-processor. That is when the currently running process is blocked due to waiting for an I/O event, another process may be scheduled to run. At this moment, the ...

Search Repository



Browse

My Account