UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Author "Aye, Zin May"

Browsing Fifth Local Conference on Parallel and Soft Computing by Author "Aye, Zin May"

Sort by: Order: Results:

  • Aung, Khin Pa Pa; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents to recognize American Sign Language (ASL) hand gestures, based on a pattern recognition technique by using orientation histograms and backpropagation neural network (BPNN). The static ASL digitized ...
  • Kyi, Khin Myo; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Security of exchanging private information over a non secure channel is important in communications system. Efficient cryptographic techniques are necessary to endow the security level in mail system. Email security is ...
  • Khaing, Mya Thet; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system ...
  • Moe, Sandar; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper presents money transfer transaction from bank to bank system to provide authentic, integrity services by using ElGamal public key digital signature and SHA-512 hash function algorithm. This system consists ...
  • Moe, Thae Ei; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, road sign recognition system (RSR) is implemented with radial basis function (RBF) neural network architecture. The system consists of image pre-processing and algorithm of RBF function to recognition that ...
  • Than, Shwe Sin Myat; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography ...

Search Repository



Browse

My Account