UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Zaw, Hnin Thiri; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the rapid advancement of network technology, the security of secret data is threatened because anyone may tend to intrude the system or eavesdrop via the communication channel. Most secret sharing schemes are based ...
  • Aung, Htat Htat; Oo, Hlaing Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, an approach is built to automatically detect acoustic events that are produced in a meeting or lecture room environment. Six audio classes are to be classified through this approach. The classes considered ...
  • Myat, Yin Yin; Mon, Ohmmar Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Pseudorandom Number Generators (PRNGs) are computational algorithms that produce long sequence of random results, which are determined by a shorter initial seed or key. Elliptic curve cryptosystem is a public key cryptosystem. ...
  • Wai, Chit Hnin; Soe, Khin Thanda (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Recommender Systems typically use techniques from collaborative filtering which recommend items that users with similar preferences have liked in the past and, also predict new rating by averaging ratings between pairs ...
  • Ko, Su Linn; Aye, Hnin Hnin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A large number of expert systems require the use of forward chaining or data driven inference. Rulebased systems are really only feasible for problems for which any and all knowledge in the problem area can be written ...
  • Hlaing, May Me Me; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the process of analyzing large data sets in order to find patterns. Mining frequent patterns is a fundamental and crucial task in data mining problems. The association rule mining is needed in order to ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Ant Colony Optimization (ACO) is a class of heuristic search algorithms that have been successfully applied to solving combinational optimization (CO) problems. The traveling salesman problem (TSP) is among the most ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Ant Colony Optimization (ACO) is a class of heuristic search algorithms that have been successfully applied to solving combinational optimization (CO) problems. The traveling salesman problem (TSP) is among the most ...
  • San, Nyein Ei; Phyu, Win Lei Lei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Case-based reasoning technology opens a very promising and enriching field for electronic commerce application, medical diagnosis, knowledge management, process control and so on. Case-based reasoning (CBR) is an ...
  • Soe, Nay Lin; Phyu, Ei The` (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Mobile Agent technology has the ability to travel from host to host in different or same network. Mobile Agents can migrate on themselves, their program and their state across the network and can execute the process at ...
  • Han, Wai Wai; Oo, Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Requirements elicitation is vital importance in system development process. While doing software system development, the stakeholders can’t states real and nearly complete requirements because they might not know what ...
  • Kyaw, May Thu; Lwin, Mar Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, information and communication technologies are developing with great speed. In the advent of information era, information technology has developed rapidly and has become significant for every business, particularly ...
  • Myint, Julia (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Mobility prediction is one of the most critical research areas in wireless network. At the network level, accurate node mobility prediction may be critical to tasks such as call admission control, reservation of network ...
  • Myint, Aye Thinzar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital Watermarking has been proposed as a mean to identify the owner or distributor of digital data. It involves the concealment of data within a discrete audio file. Audio Watermarking has been proposed as a possible ...
  • Myint, Phyu Hninn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A variety of Natural Language Processing (NLP) tasks, such as named entity recognition, stemming, question answering and machine translation, benefit from knowledge of the words syntactic categories or Part-of-Speech ...
  • Myint, Phyu Hninn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A variety of Natural Language Processing (NLP) tasks, such as named entity recognition, stemming, question answering and machine translation, benefit from knowledge of the words syntactic categories or Part-of-Speech ...
  • Oo, Zin May; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data Mining is the task of discovering interesting patterns from large amounts of data where the data can be stored in relational databases. Data generalization is a process that abstracts a large set of data in a ...
  • Kyaw, Tin Ei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The massive multimedia data, including video, audio, and text can be used by users in content browsing, retrieval, classification management. In this study, audio event classification through a Genetic Regulatory Network ...
  • Linn, Kyi Chan Nyein (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Audio-Fingerprints (AFPs) are essential characteristics of digital audio streams used to score the perceptual similarity between audio signals. Audio-fingerprinting systems extract features from the signal normally on ...
  • Su, Ei Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Audio Steganography is an art of hiding secret information within multimedia objects to prevent unauthorized persons. Information hiding technique using audio sound files is a new kind of secret communication technology. ...

Search Repository



Browse

My Account