UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Phyu, Su Lei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A temporal database is a database with built-in time aspects or a temporal data model and a temporal version of structured query language. More specifically the temporal aspects usually include valid time and transaction ...
  • Aung, Hninn Mar; Chan, Wint Nyein (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Multi-agent Recommender System exploits a collection of interacting agents jointly executing the recommendation generation process. Each agent processes part of the recommendation and/or the interaction, and the established ...
  • Soe, Cherry; Khaing, Thet Thet (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The tremendous growth in the amount of available information and the number of visitors to Web sites in recent years poses some key challenges for recommender systems. Recommender systems form a specific type of information ...
  • Yi, Soe Lai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Record matching is the task of identifying records that match the same real world entity. Detecting data records that are approximate duplicates, is an important task. Datasets may contain duplicate records concerning the ...
  • Cho, Yin Yin; Htwe, Tin Myat (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Transliteration is the process of mapping from one system of writing into another, word by word. This system presents an algorithm for English- Myanmar cross-language transliterated word retrieval. Soundex matching is ...
  • Moe, Thae Ei; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, road sign recognition system (RSR) is implemented with radial basis function (RBF) neural network architecture. The system consists of image pre-processing and algorithm of RBF function to recognition that ...
  • Khaing, Myint Soe; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, rule-based expert system for Blood Donation Bank is proposed in this paper. Rule-based expert systems are a way to store and manipulate knowledge to interpret information in a useful way. They are often used ...
  • Pyone, Mi Mi; Aung, Hninn Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper is intended to implement the Rule-based system for staff management. There are many rules in the system. These rules are predefind rule.The system works with If- THEN rules and with input data provided by the ...
  • Hlaing, Su Su Swe; Htun, Thaung Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Classification is one of the most popular data mining tasks with a wide ranges of application and lots of algorithms have been proposed to build scalable classifiers. Several data mining techniques and classification methods ...
  • Thandar, Aye Mya (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper aims to scale up the Naïve Bayesian Classifier using Genetic and Decision Tree for feature selection. The main reason is to predict patient's breast cancer result based on their diagnosis using this scaled ...
  • Nwe, Win Hay Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Conventional database query methods are inadequate to extract useful information from huge data banks. Cluster analysis is one of the major data analysis methods, and process of grouping a set of physical or abstract ...
  • Than, Shwe Sin Myat; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography ...
  • Nandar, Saw Mya; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. There are a lot of image encryption algorithms. Because of ...
  • Chit, Aye Myat Myat Mon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The development of communication technology, security is a major concern. The widely used image in communication process is vital to protect important image data from unauthorized access. In this paper, the digital ...
  • Yi, Khone Mar; Zar, Tin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The messaging system has become the most popular for mobile communication in the world. This paper is intended to implement secure messaging system for mobile communication. To encrypt / decrypt the message between the ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...
  • Kyaw, San Ohnmar; Zar, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    File Transfer Protocol (FTP) is the standard mechanism for copying a file from one host to another. Transferring file from one computer to another is one of the most common tasks expected for networking and internetworking ...
  • Mon, Ei Ei; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. The cloud allows users to avoid upfront ...
  • Sein, Ma Htaw; Win, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Sequential pattern mining is an important data mining problem with broad applications. Most of the sequential pattern mining methods, such as GSP (Generalized Sequential Pattern) and AprioriAll explore a candidate ...
  • Phyo, K-zin; Win, Thandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, optimization/minimization is a key factor in almost all topics of operation research, management science and economic. Road networks can be minimized within different constraints like time, distance, cost and ...

Search Repository



Browse

My Account