UCSY's Research Repository

Browsing Sixth Local Conference on Parallel and Soft Computing by Issue Date

Browsing Sixth Local Conference on Parallel and Soft Computing by Issue Date

Sort by: Order: Results:

  • Thwin, Su Myat; Min, Mar Mar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Data mining is a process that uses a variety of data analysis tools to discover patterns and relationships in data that may be used to make valid predtictions. Classification is a form of data analysis that can be used ...
  • Aung, Su Thandar; Sandar, Khin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    A multi-agent system is a collection of multiple intelligent agents that interact with other agents or environments to achieve its goal by communication, coordination and cooperation. The agent acts like a personal assistant ...
  • Thu, Aye Myat (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This system produces healthy diet menu set plan to get foods to keep healthy life. BMI and BMR formula is used to estimate how much daily calories should consume order to maintain weight. Many models can be made by using ...
  • Myat, Khin Wah Wah (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Association rule mining is finding frequent patterns, association, correlations among sets of items or object in transaction databases, relation databases, and other information repositories . Association rule mining ...
  • Sin, Ei Shwe; Kham, Nang Saing Moon (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Today, Hyper-Heuristic is not new in AI Field. It is an emerged search technology to select or generate (new) low level heuristics for combinatorial optimization problem and has been applied in many problem domains: personal ...
  • Naing, Soe Kalayar; Myo, Nyein Nyein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Decision tree learning algorithm has been successfully using in data minng for training data set. In this system, the main task performed is using inductive methods to the given values of attributes of an unkown object to ...
  • Aung, Yunn Mee Mee (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Today many business and factory want to get maximum profit for their products, so they use many optimum resource allocation methods for decision variables or slack variables. (E .g – By using Simplex method, Big –M method, ...
  • Maw, Aye Aye; Aung, Nwe Ni (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, hotels are in the large-scale distributed environments where each site offers services to user through transparent external communication. Web Services are becoming one of the most important paradigms for the ...
  • Oo, Khaing Wai; Yuzana (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Auctions are a fundamental mechanism to automate negotiations in electronic commerce. This paper presents agent-based mechanism for autonomous multiple criteria reverse English auction. In the multiple criteria auctions, ...
  • Than, Wai Me Me; Kham, Nang Saing Moon (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper presents the probabilistic model named Twodimensional Probabilistic Model (2DPM). In this model, terms are seen as disjoin events, and terms and categories are realeated to each other. Since the documents are ...
  • Wutyi, Hnin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Software as a Service (SaaS) is a way if delivering applications over the internet – as a service. SaaS is a one methodologies of Cloud Computing and also model of Software development. The problem of on-premise software ...
  • Nwey, Zun Nyein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy information retrieval (PIR) can be viewed as a service between a user and a database. Private retrieval of public data is critical in these days when a client wants to query a public data service without expressing ...
  • Thein, Lwin Po Po; Nyunt, Kyi Zar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    In data mining, association rule learning is a popular and well researched method for discovering interesting relations between variables in large databases. Association rules describe events that tend to occur together. ...
  • Kyaw, Cho Cho (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy protection play a vital role to build up the cloud computing environment. This system intends to implement secure cloud privacy system using Identity based Encryption (IBE) and Identity based Signature (IBS) ...
  • Soe, Aye Thandar; Aye, Aye (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Frequent itemsets mining is a discovery of interesting associations and correlations between itemsets in transcational and relational databases. Associaton rule mining is a popular method in the retail sales industry where ...
  • Linn, Thu Zar; Aung, Than Htike (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Association rule mining is widely used in business enterprise to analyze for marketing strategies and its good is to find interesting association or correlation relationship among a large set of data items. With massive ...
  • Tun, Thinzar; Win, Chit Nilar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Data Mining aims to discover novel, interesting, and useful knowledge and patterns from databases. Classification is a data mining technique which addresses the problem of constructing a predication model for a ...
  • Hlaing, Su Su (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Agent technology is rapidly emerging as a powerful computing paradigm to cope with the complexity in dynamic distributed systems in transportation systems such as ticket booking. This paper describes the use of software ...
  • Ei, Nyein Nyein; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    The general idea of the paper is to encrypt the selected data in the datasheet using Rijndael cipher, and then save the cipher text to the storage media. Rijndael is a substitution-linear transformation network with ten, ...
  • Wai, Nu Htet (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    With the developing of technologies, people invented many kinds of robots such as autonomous robots, industrial robots, and mobile robots. One kind of important part of the robots is industrial robots that usually consist ...

Search Repository



Browse

My Account