UCSY's Research Repository

Browsing Eighth Local Conference on Parallel and Soft Computing by Title

Browsing Eighth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Thin, Phyu Phyu; Thein, Thandar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The demand for cloud computing is increasing because of the popularity of digital devices and the wide use of internet. That makes malicious users to make crimes. Therefore a study of digital forensics investigations ...
  • Lwin, Thin Yu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The modern era is of digitalization and thus we want to transmit large data in limited bandwidth. Today a variety of computer, scientific and engineering application have difficulty to store and transmit the large size ...
  • Oo, Shwe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Content-based image retrieval (CBIR) is the uses of visual features of the image, such as color, texture, shape, match the query image and database, return similar image to the user. Color is the most significant feature ...
  • Phue, Wai Mon Mon; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In today’s world, parallel processing framework is a widely used for the applications which need too much processing power. As an example, the basic requirement of security problems is to permute the input text into ...
  • Oo, Hnin Wit Yi (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Along with the economic development, traffic hasincreased enormously these days. Due to the increasing urban population and hence the number of cars, need of controlling the traffic on roads is vital. Automatic detecting ...
  • Aye, Chan Pyi Pyi (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Most applications today are using web service to collaborate each other, e.g., weather reports, credit checks, stock quotations, or currency exchange. Web service provides a standard means of interoperating between different ...
  • Myint, Tin Thu Zar; Nwe, Tin Htar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Case-Based Reasoning (CBR) is the process of solving new problems based on the solutions of similar past problems. The CBR can be used to find the specific knowledge of previously experienced problem situations (cases).The ...
  • Ei, Ei; Maw, Aye Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Concurrency control in distributed systems is an important problem for the simultaneous execution of transaction over a shared database can create several data integrity and consistency problem. The distributed system ...
  • Oo, Thaw Tar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Credit classification is a system that determines credit applicants, either “good credit” one that is likely to repay financial obligation or “bad credit” one who has high possibility of defaulting on financial obligation, ...
  • Oo, Thaw Thaw May (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Business Intelligence, the process of gathering, storing and analyzing data, building knowledge from the analysis and taking action based on the knowledge is the single most powerful success factor in business ...
  • Cho, May Zin Zin; Khin, Tar Tar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Relational database normalization is an important step in database design. The goal of normalization is to reduce data redundancy and facilitate efficient updates. RDBNorma is used for semi-automating the process of ...
  • San, Khin Kaung; Khaing (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In distributed system, the database can be replicated in multiple servers stored at different sites.Certain data items may be redundantly stored at more than one site for reliability reasons.Replication is a key to ...
  • Win, Khaing Zar; Tun, Khin Mar Lar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Today many business applications use Database System to maintain their business information and many users access to Database to get information. The system need to create the security principals for users to allow ...
  • Aung, Ko Ko; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A distributed database is a database with its data elements are stored at several sites of a computer network. Certain data items may be redundantly stored at more than one site for reliability reasons. A replicated ...
  • Tun, Wut Yee; Nwe, Khine Moe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In distributed environments, materialized views are used to replicate the data at distributed sites and to synchronize data updates at several sites. Thus, Materialized view is a kind of way to replicate the distributed ...
  • Naing, Thin Wai Wai; Wai, Khaing Khaing (2017-12-27)
    The messaging system has become the most popular for electronic communication in the world. This paper is intended to implement secure messaging system for electronic communication. In this age of viruses and hackers ...
  • Ko, Win Ko; Khaing, Ma (2017-12-27)
    Nowadays, traffic congestion is becoming a serious problem in more and more modern cities. Therefore, this system is implemented to solve the travelers’ facing problems in finding the shortest path from one place to ...
  • Htay, Ma; Hlaing, Swe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Thyroid is one of the most common diseases found in human being, it is not a deadly disease, but it is chronic disease which can give rise to other diseases. Hypothyroidism is simply not enough thyroid hormone and ...
  • Moe, Khin Myat; Myint, May Tar Hla (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Database security is the system, processes, and procedures that protect a database from unintended activity. There are two type of database security, description access control (DAC) and Mandatory Access Control (MAC) ...
  • Phyu, Moe Pwint; Thant, Win Win (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, Mobile Banking (MB) System is performing of finance related functions on a mobile device. MB can be used anywhere you take your device and fast banking today. Current MB confidentiality and authentication ...

Search Repository



Browse

My Account