UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Wai, Ei Phyo; Sein, Myint Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Biometrics is used for human recognition which consists of identification and verification. In an identification application, the biometric device reads a sample and compares that sample against every record or template ...
  • Oo, Lwin Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents Frequently Asked Question (FAQ) finder system that uses a natural language question based on interface to access text information sources specifically text files organized as question-answer pairs ...
  • Tin, Hlaing Htake Khaung (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Face recognition is currently highly researched area of computer vision and pattern recognition. Age changes cause major variations in the appearance of human faces. In this paper, we propose a new aging scheme, which ...
  • Win, Zin Me Me; Maw, Tin Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the significant increment of today’s network, there is a decrease in the efficiency of the network. The performance and reliability of the Internet depend, in large part, on the operation of the routing protocols. ...
  • Win, Zin Mar; Sein, Myint Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Fingerprints are widely used in biometric techniques for automatic personal identification work. In this paper, a fingerprint recognition system is developed to identify a person according to fingerprint image on Myanmar ...
  • Phyo, Aye Su; Sandar, Khin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper proposes a fingerprint types classification algorithm using Learning Vector Quantization (LVQ) with FingerCode features. This algorithm assigns each fingerprint image to one of the five subclasses, according ...
  • Than, Kyaw Myo; Htay, Hla Hla (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, we propose a method for identifying font scripts of Myanmar Language. Because of the unavailability of nationwide standardized encoding scheme in Myanmar font scripts, knowledge written in Myanmar language ...
  • Aung, Moe Zaw (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the real world, the football sport league scheduling is very popular, while the people all over the world are encouraging and watching football matches interestingly. The existing situation according to the program ...
  • Aung, Htet Htet (fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This system forecasts in water level in Pyay river state. Water level is forecasted by using water level is forecasted by using Fuzzy Logic. This paper is to describe the implementation of flood condition system of ...
  • Khine, Phyo Thu Thu; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital library (DL) research and development has concentrated primarily on collections and on the services to build and access them. And when the large quantity of Myanmar document is getting archived by the digital ...
  • Tun, Sandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Frequent itemsets mining leads to the discovery of associations and correlations among items in large transactional or relational data sets. Frequent itemsets mining is market basket analysis. This paper presents to analyzes ...
  • Han, The Su; Nyunt, Kyi Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Expert systems are typically developed to solve unclear application fields or problems. Expert systems based on fuzzy logic has two advantages over traditional expert systems: high approximation ability and high accuracy. ...
  • Lwin, Phyu Phyu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Fuzzy logic is widely used in machine control. Although genetic algorithms and neural networks can perform just as well as fuzzy logic in many cases, fuzzy logic has the advantage that the solution to the problem can ...
  • Pyae, Khaing Hsu; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Combinatorial problems are prominent in Artificial Intelligent and Operation Research. They can’t be solved in a given polynomial time with deterministic algorithm, also known as NP complete. Some researchers survey ...
  • Aung, Khin Pa Pa; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents to recognize American Sign Language (ASL) hand gestures, based on a pattern recognition technique by using orientation histograms and backpropagation neural network (BPNN). The static ASL digitized ...
  • Myint, Nan San San; Thwin, Khin Lay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Handwriting digit recognition is a challenging problem researchers had been research into this area for so long especially in the recent years. In this paper, this system used to recognize the handwritten digits of Kayin ...
  • Wai, Thinn Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In statistical machine translation, reordering is crucial component for translation of the different languages with different word orders. Without reordering during language translation, sentences can only be translated ...
  • Naing, Hay Mar Soe; Nyunt, Thi Thi Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, everybody is facing many problems with making decisions and future planning of global and regional works all over the world. The analytic network process (ANP) is one of the most widely used multiple criteria ...
  • Win, Ei Shwe Sin; Mon, Myat Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper to protect copyright, ownership and content integrity of digital media including digital watermarking techniques. The primary motivation of this article is to study the principles of cryptographic primitives ...
  • Thu, May Phyo; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has ...

Search Repository



Browse

My Account