UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Hlaing, Su Su Swe; Htun, Thaung Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Classification is one of the most popular data mining tasks with a wide ranges of application and lots of algorithms have been proposed to build scalable classifiers. Several data mining techniques and classification methods ...
  • Thandar, Aye Mya (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper aims to scale up the Naïve Bayesian Classifier using Genetic and Decision Tree for feature selection. The main reason is to predict patient's breast cancer result based on their diagnosis using this scaled ...
  • Nwe, Win Hay Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Conventional database query methods are inadequate to extract useful information from huge data banks. Cluster analysis is one of the major data analysis methods, and process of grouping a set of physical or abstract ...
  • Than, Shwe Sin Myat; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography ...
  • Nandar, Saw Mya; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. There are a lot of image encryption algorithms. Because of ...
  • Chit, Aye Myat Myat Mon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The development of communication technology, security is a major concern. The widely used image in communication process is vital to protect important image data from unauthorized access. In this paper, the digital ...
  • Yi, Khone Mar; Zar, Tin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The messaging system has become the most popular for mobile communication in the world. This paper is intended to implement secure messaging system for mobile communication. To encrypt / decrypt the message between the ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...
  • Kyaw, San Ohnmar; Zar, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    File Transfer Protocol (FTP) is the standard mechanism for copying a file from one host to another. Transferring file from one computer to another is one of the most common tasks expected for networking and internetworking ...
  • Mon, Ei Ei; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. The cloud allows users to avoid upfront ...
  • Sein, Ma Htaw; Win, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Sequential pattern mining is an important data mining problem with broad applications. Most of the sequential pattern mining methods, such as GSP (Generalized Sequential Pattern) and AprioriAll explore a candidate ...
  • Phyo, K-zin; Win, Thandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, optimization/minimization is a key factor in almost all topics of operation research, management science and economic. Road networks can be minimized within different constraints like time, distance, cost and ...
  • Wai, Su Lin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, identifying the artist of a query song from the audio database is considered. To build the model of a specific signer, only the vocal segments of a song is employed. Mel-Frequency Cepstral Coefficient (MFCC) ...
  • Swe, Yee Yee; Tun, Myint Thu Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Capacity planning is the process of determining the production capacity needed by an organization to meet changing demands for its products. A discrepancy between the capacity of an organization and the demands of its ...
  • Khaing, Myo; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A common goal for a statistical research project is to investigate causality, and in particular to draw a conclusion on the effect of changes in the values of predictors or independent variables on dependent variables ...
  • Khaing, Myo; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A common goal for a statistical research project is to investigate causality, and in particular to draw a conclusion on the effect of changes in the values of predictors or independent variables on dependent variables ...
  • Than, Nwe Ni; Maw, Tin Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The need for random and pseudorandom numbers arises in many cryptographic applications. Generating high-quality randomness is a vital part of many cryptographic operations. This paper presents some aspects of selecting and ...
  • Win, Me Me; Zaw, Win Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In distributed database system, replicated databases are composed of many copies of databases distributed across different sites. Distributed applications frequently use replications to achieve higher level of performance, ...
  • Win, Me Me; Zaw, Win Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In distributed database system, replicated databases are composed of many copies of databases distributed across different sites. Distributed applications frequently use replications to achieve higher level of performance, ...
  • Kywe, Win Win; Zaw, Win Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, the world is facing the revolution of Internet. So the world has reacted in several ways to the “E” technology such as E-government, Elearning, E-application, E-application, E-commerce and E-business and so ...

Search Repository



Browse

My Account