UCSY's Research Repository

Browsing by Issue Date

Browsing by Issue Date

Sort by: Order: Results:

  • Yar, Thar; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence (AI) is the computational part of the ability to achieve goal. A search algorithm, broadly speaking is an algorithm that takes a problem as input and returns a solution to the problem, usually ...
  • Myint, Kyaw Phone; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-Base Reasoning (CBR) system is an artificial intelligent approach to learning and problem solving based on last experiences. The knowledge of case adaption is used to guide the retrieval process. Possible adaption ...
  • InZaLi, Htar; Kham, Nan Si (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Travels and tourism service is developing and very popular around the world and information technology is having a big effect on all sectors of tourism. Tourists have problems to find what they are looking for, especially ...
  • Win, May Thu; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, the security of the information exchanged is very important. In this paper, MD5 is used for computing the hash value of the message and RSA is used for signing the message and verifying the digital signature. ...
  • Yan, Phyo Wai; Thida, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Clustering algorithms are data attractive for the last class identification in spatial databases. This system presents the new clustering algorithm DBSCAN (Density-Based Spatial Clustering of Applications with Noise). ...
  • Min, Zay Yar; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the technology grows rapidly, many people take a great interest in computer and then computerbased methods are increasingly used to improve the quality of the medical services. Human experts in medical field ...
  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Thein, Myo Min; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today. More and more information has been transmitted over the World. The information is not only text, but also audio, image, and other multimedia Images have been widely used in our daily life. This paper presents on ...
  • Thuya, Sai Kyaw; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the information technology communication advances, there is a need for strong interest in the information security. Encryption is one of the alternative techniques that can be applied to any system for safeguarding ...
  • Aung, Myat Soe; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case based reasoning (CBR) is very important subfield of artificial intelligence which is growing rapidly. CBR based applications are used very commonly in many different fields. In this paper, we present classification ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Htet, Lwin; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There ...
  • Aung, Pyae Phyo; Soe, Khin Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system develops an intelligent search mechanism among large amount of distributed data on a Peerto- Peer network. To illustrate the intelligent search mechanism, the system builds a decentralized newspaper application. ...
  • Than, Myo Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In computer and network systems, the private access systems use cryptosystems that provide to certain and ensure data of information that are authentic and secure. This paper will develop the secure bank transaction ...
  • Zodingliana (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptograph is crucial to communicating medium. The use of cryptography today becomes widespread, not just in military situation but for commercial and private purposes. So the electronic messages and documents which ...
  • Htein, Aung Thet (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Data mining is process of pattern extraction from a large collection of datasets.Main goal of data mining is to discover the frequent itemsets(patterns).Sequential pattern mining is an important data mining problem that ...
  • Latt, Tin Mg (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents a method for detection of ECG QRS complexes using signal energy. This system reliably recognizes QRS complexes based upon digital analyses of slope, amplitude, and width. In order to reduce false ...
  • Lwin, Pyae Phyo; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Intelligent control of home appliances has attracted much theoretical attention, as well as becoming a major factor for industrial and economic success and rapid market penetration. A fuzzy control that uses rules based ...
  • Soe, Naing Thura; Thant, Khin Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Dijkstra’s Algorithm solves the problem of finding the shortest path from a point (the source) to a destination. This problem is sometimes called the single-source shortest path problem. In these days, the world become ...
  • Khin, KayKay Thi Wut Hmone; Oo, Lwin Lwin (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today, people use widely computer networks to communicate from one place to another. When people use computers, they will need necessary to protect the information and to thwart the hackers. So, people interconnect their ...

Search Repository

Browse

My Account