UCSY's Research Repository

Browsing Eighth Local Conference on Parallel and Soft Computing by Title

Browsing Eighth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Khaing, Ei Ei Kay; Tun, Khin Mo Mo (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Classification is one of the most widely used data mining techniques with a lot of extension. Query classification is crucial for web search and advertising. Classification of web queries is important to provide search ...
  • Khine, Khin May (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Driver Fatigue detection is an important role in transportation for safety system. Driver drowsiness has been one of the major causes of road accidents and can lead to severe physical injuries and deaths. This thesis ...
  • Aung, Win Sandar; Thein, Yadana (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Today, the smart surveillance security system is controlled automatically not only in the business environment but also in the personal home security management. The integration of the Arduino and the Android based ...
  • Khine, May Thin Thin; Aung, Khaing Khaing (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The World Wide Web information grows explosively in the Internet and people encounter problem to pick some correct things from the overwhelming set of choices. The recommender systems help them choose something they ...
  • Swe, Thuzar; Win, Thinn Thinn (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Recommender System generates meaningful recommendations to users for items or products that might be interesting for them. It can help people to find interesting things and is widely used with the development of ...
  • Phyu, Su Pwint; Thein, Lay Myat Myat (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Information filtering systems, which recommend appropriate information to users from enormous amount of information, are becoming popular. Recommender systems are programs which attempt to predict items that a user may ...
  • Ma, Tin Ma (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Nowadays, many Rule-Based Expert Systems have been proposed and almost all of them assume “IF-THEN” rules. The process of matching rules is performed by the data-driven approach, Forward Chaining method, in the ...
  • Htay, Hsu Myat; Oo, Khine Khine (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The Abhidhamma is one of the three parts of the Pali cannon, the Tipitaka, the main texts of Theravada Buddhism and is sometimes described as ‘Buddhist Psychology’ [2]. Human mind is consciousness (citta) and mental ...
  • Lwin, Khin Moe; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper proposed an approach of searching the optimal bus-routes based on data mining technology called Frequent Subgraph Mining (FSM).FSM is an important task for exploratory data analysis on graph data. Many approaches ...
  • Nwet, Khin Thandar; Oo, Nyo Nyet Nyet (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In Myanmar language, the spoken language may be different with the written language in many cases. In Myanmar, the words are the same phonetically in pronunciations with different spellings such as ကုနရန်, ယန်ဂုန်, ...
  • Nyo, Mi Than Than; Aye, Zin May (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The security of data transmitted over wireless network of passive scanning is of increased interest. Sending data and messages are one of the popular ways of communication.As sending data and messages through mobile ...
  • Wai, Hnin Yu; Thein, Yadana (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Steganography is the method of communicating secrete information hidden in the cover object, that may be text, image, audio, video, and protocol for the purpose of hidden the existence of secret messages. In this ...
  • Nain, Win Theingi; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Mining opinions and sentiments from natural language is challenging, because it requires a deep understanding of the explicit and implicit, regular and irregular, and syntactical and semantic language rules. Sentiment ...
  • Hlaing, Ei Mon; Kham, Nang Saing Moon (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Today’s websites are having a lot of small parts or details arranged in a complicated way and are therefore sometimes difficult to understand for the visitors.The web sites designers are faced with increasing ...
  • Khaing, Nan Ei; Phyu, Sabai (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Particularly, information retrieval results as documents are typically too extensive. Consequently, a similarity measurement between keywords and index term is essentially performed to facilitate searchers in accessing ...
  • Myint, Yu Mon; Khaing, Ma (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper presents a type of clusteringbased intrusion detection using single-linkage clustering algorithm.Basic methods for clustering include the Linkage based and K-means techniques.The K-means method generally produces ...
  • Thet, Khaing Zin; Mya, Khin Than (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Information technology plays a vital role for the development of smart cards. Smart cardscan change the form of the delivery of services and goods, through the automatedidentification and verification of customers, ...
  • Khin, Phyo Su; Wai, Khaing Khaing (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Mobile phones have changed our day to day life totally. Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communication protocols that ...
  • Aung, Htet Wai; Thein, Thandar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The availability of the complex IT system for everything, everywhere, at all time is a growing requirement. However, the availability of IT infrastructures is still a massive challenge currently. Unexpected downtime ...
  • Naing, May Thu; Sein, Myint Myint (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Video Steganography deals with hiding secret data or information within a video file without changing the video display or audio. The secret information is embedded in the cover frames by splitting data. If LSB (Least ...

Search Repository



Browse

My Account