Browsing by Title

Sort by: Order: Results:

  • Thwe, Phyu Hnin; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    RSS (Really Simple Syndication) is a technology that is being used by millions of web users around the world to keep track of their favourite websites. By using RSS, we can stay on top of the news and information without ...
  • Htet, Su Win; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Question Answering (QA) is a fastgrowing research area that brings together research from Information Retrieval, Information Extraction and Natural Language Processing. Question Answering system (QA), is a kind of ...
  • Oo, Khine Zin; Khaing, Aye Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    One of the important problems in data mining is discovering association rules from databases of transactions where each transaction consists of a set of items. The most time consuming operation in this discovery process ...
  • Aung, Thuzar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A distributed database is not stored in its entirety at a single physical location. Instead, it is spread across a network of computers that are geographically dispersed and connected via communications links. A ...
  • Aung, Htin Lin; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Internet and network applications are growing very fast, so critical information is needed to protect . Crypto algorithms play a main role in information security systems. In this paper, we present secure data ...
  • Win, Cherry Kyaw; Zar, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Internet and network applications are growing very fast. Thus, people need to protect the information and to thwart the hackers. People interconnect their secret data by using cryptographic algorithms. But, the ...
  • Wai, Ei Chu; Wai, Khaing Khaing (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper presents data transfer system between two users using the asymmetric-key cryptography. Asymmetric-key cryptography or public-key cryptography is cryptography in which a pair of keys is used to encrypt and ...
  • Thura, Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Two secure end users want to communicate over an insecure channel. The enemy user is an outsider, listening to attack the communication. Encryption is the converting readable information as “plain text” into ...
  • Ko, Naing Linn Ko; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The growth of the Internet and e-commerce has presented businesses; these have also been exposed to the various threats. So, network security is necessary to counter the threats and make networks safe to use. The main ...
  • Hlaing, Pwint Wai; Thida, San (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Protecting privacy and ensuring the security of very important data and operations in an organization are essential need for the detergent production organization. Access control is the important mechanism for protecting ...
  • Hlaing, Wut Yee Pwint; Aye, Zin May (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Kyaw, Kay Zar; Hla, Ni Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Sequential Pattern mining is an important data mining field with wide range of applications that can extract frequent sequences while maintaining their order. It is important to identify item intervals of sequential patterns ...
  • Aung, Htike Htet; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Graphs have been used in a wide variety of application. Some of these applications are analysis of electrical circuits, finding shortest routes, project planning, and identification of chemical compounds, statistical ...
  • Ko, Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Natural Language Processing (NLP) is one of the most important research area carried out in the world of Artificial Intelligence (AI). NLP supports the tasks of a portion of AI such as Spell Checking,Machine Translation, ...
  • Thein, Si Thu Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is very important role for information and data. Data communication is the most important in the world. Communication technology is increased as well as an authorized person can intercept the security ...
  • Wai, Su Latt; Myint, Aye Sandar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    While storing XML documents in RDBMS, serveral methods can be used. This paper is intended to implement a system for storing XML documents is Relational Database Management Systems. This proposed system is chosen toimplement ...
  • Aung, Zayar; Aung, Ye Thu; Sergeevich, Mihaylov Ilya; Linn, Phyo Wai (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    The article deals with the problem of timely forecasting and classification of problems that arise in the process of well construction remains relevant. It is necessary to create a new methodology that should help ...
  • Htun, Aye Thiri; Hlaing, Swe Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A language compiler is one of the most crucial tools for the system development. Java Compiler Compiler (JavaCC) [tm] is the most popular parser generator for use with Java [tm] applications. For a given a context free ...
  • Han, Aye Mon; Aye, Kalyar Maw Thein (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web Services is a Web-based application that dynamically interacts and/or integrates with other Web application using open standards that include XML, UDDI and SOAP over an Internet network. One of the anticipated benefits ...

Search Repository

Browse

My Account