UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Cho, War War; Nwe, Nwe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Frequent pattern mining is one of the active research themes in data mining. It is an important role in all data mining tasks such as clustering, classification, prediction and association analysis. Frequent pattern is the ...
  • Thu, Mi Swe Zar; Mar, Soe Hay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Computer base methods are increasingly used to improve the quality of medical services. Expert system uses knowledge, facts and reasoning techniques to solve problems that normally require the expertise, experiences and ...
  • Phyu, Aye Pwint; Nyein, May Kyi (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A database is a structured collection of data items that can be accessed concurrently by several transactions. The concurrency control in distributed databases is an important problem. This paper is intended to build ...
  • Myint, Khin Sandar; Htoon, Ei Chaw (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Commuting operations greatly simplify consistency in distributed systems. A Commutative Replicated Data Type (CRDT) is one where all concurrent operations commute. The replicas of a CRDT converge automatically without ...
  • Yee, Thiri The` Wut (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The revolution of mobile phones era has brought the innovative smartphones technology. As a result, research addressing information access in smartphones environment has proliferated. The important feature in security ...
  • Moe, Khin Wai; Thein, Naychi Lai Lai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper describes the mobile agent-based music selection that generates dynamic playlist based on suggestions from multiple users and presents the design and development of music selection service which is implemented ...
  • Soe, Aye Aye; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes ...
  • Aung, Myat Thu; Cho, Aung (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the task of discovering interesting patterns from large amounts of data. These data can be stored in database. Data classification in data mining tasks is the process of building a model from available data ...
  • Zaw, Sai Maung Maung (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper is presented as hybrid protocol for MAC layer in Wireless Sensor Networks (WSNs). It combines contention and schedule-based methods. Time slots are assigned at deployment and reassigned when significant ...
  • Latt, Kyaw Zin; Ko, Lin Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication ...
  • Win, Phyoe Su Su; Mon, Thet Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The general elements of transaction processing are data capture and validation, transaction-dependent processing steps and database maintenance. Database Management Systems (DBMS) are among the most complicated applications. ...
  • Hlaing, Htike Ayar; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the current computing community, secure data transfer is limited due to its attack made on data communication. Solutions which came to the rescue are cryptography and steganography. Cryptography is often used in ...
  • Win, Swe Zin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Today, many business applications continue the ongoing creation of separated data stores; data mining often requires data integration for those data. This process becomes significant in a variety of situations both ...
  • Nwe, Nann Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data replication is a key technology in distributed systems that enable higher availability and performance. Data replication consists of maintaining multiple copies of data, called replicas, on separate computers. ...
  • Nwe, Aye Aye; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the ...
  • Myint, May Phone; Win, Thandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital image watermarking is a method trying to embed small image inside a large original image. The original image will be converted into frequency domain to obtain the Discrete Cosine Transform (DCT) matrices from its ...
  • Kyaw, Phyo Ma Ma; Myaing, Khin Lay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Combination of Fuzzy logic and Genetic Algorithm is used for searching of optimal solutions. To obtain the globally optimal rules, the Fuzzy rulebases are searched by means of Genetic Algorithm. In Fuzzy inference ...
  • Soe, Hsu Yadanar; Thei, Mon Mon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, medical diagnosis reasoning is a very important application area of computer-based system. There is a wealth of data available within the healthcare systems. There is a lack of effective analysis tools to discover ...
  • Oo, Myat Noe; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Electronic commerce (e-commerce) has changed the outlook of traditional business trading behavior. E-commerce includes different types of activities related to the online sales of goods and services. In this paper, ...
  • Zin, Po Po; Aye, Hnin Hnin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper describes the method to classify user’s knowledge level using decision tree induction. Decision trees can easily be converted to classification rules by using decision tree induction. This system is to estimate ...

Search Repository



Browse

My Account