UCSY's Research Repository

Browsing by Issue Date

Browsing by Issue Date

Sort by: Order: Results:

  • Oo, Thane Sat; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The World Wide Web has grown from a few thousand pages to billion of pages at present. Due to this explosion in size, web search systems are becoming increasingly important as the primary means of locating relevant ...
  • Kyi, Ye Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence is defined generally as the attempt to construct mechanisms that performed by humans. The knowledge base contains knowledge necessary for understanding, formulating, and solving problems. This ...
  • Aye, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is an important field of study for most day-to-day transactions. Cryptography standards are needed to create interoperability in the transformation security world. Cryptography mechanism is based on ...
  • Kyaw, Thein Gi; Tun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Expert System is a high performance problem solving capable of simulating human expertise in domain. A case-based reasoning (CBR) is an approach that allows one to solve a new problem using or adapting a solution of ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Tun, Thurein; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The propose system intends to implement the Email security system using RC5, BBS and RSA algorithms to encrypt and decrypt of messages. It also intends to analysis the symmetric key algorithm , public key algorithm , ...
  • Aung, Yin Pa Pa; Htoo, Nay Zar Chi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptography makes secure websites and electronic safe transmission possible. For a web site to be secure all of the data transmitted between the computers where the data is kept and where it is received must be encrypted. ...
  • Myint, Yuzana; Swe, Ei Mon Mon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper describes the work done on the development of an audio classification system. Audio recordings are classified into basic audio types such as speech or music. Audio classification is processed in two parts, ...
  • Naing, Tint Htoo; Nge, Mi Mi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-base Reasoning (CBR) is an artificial intelligent approach to learn and solve the problem emphasizes the role of prior experience. Case-base reasoning methods have to deal with the current problem to identify the ...
  • Maung, Arkar Aye; Hole, Gilmour (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, everybody is facing many problems with making decisions and future planning in current topic in global and regional works all over the world. However, problems for the multiple criteria decision- making are ...
  • Soe, Yan Naung; Nyunt, Thi Thi Soe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Multi-level Marketing (MLM) system has become very popular in international marketplace because of its independent distributors development system and commission payment method. The nature of Multi-level Marketing system ...
  • Ei, Min Min; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In medical field, it is very difficult to get correct Diagnosis because there are many possible diseases in each case. And it is also important to get correct diagnosis as soon as possible to save lives of people. It ...
  • Thein, Nan Sandar; Oo, Hlaing Thida (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The process of student evaluation is based on a procedure where we assume that the student belongs just to one set in a completely specified way, for example the set of excellent students, or the set of regular students. ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Oo, Kyaw Zayar; Nge, Mi Mi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Yangon city is a highly populated city and bus transportation is an essential portion of most of the city people. Bus transport system in Yangon is facing multiple problems to improve efficiency. One of the problems is ...
  • Oo, Hlaing Myo; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The data security is useful not only for strong and communication data in secret but also for ensuring that the source of the message is valid and that the message has not been altered. Cryptography was created as a ...
  • Hein, Nay Zaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Combinatorial reasoning underlines all analysis of computer systems. It plays a similar role in discrete operational research problems. Two of the most basic mathematical aspects of computer science concern the speed ...
  • Han, Hane Thu; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The role of cryptograph is important for data security. Many cryptographic techniques can be used to keep security of sensitive data. Information is an arm of Military as well as the security of information is it’s life. ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Zeya, Kyaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The fire service mission is to assist the public in the protection of life and properties by minimizing the impact of fire, medical emergencies, and potential disasters or events that affect communities and the envir ...

Search Repository

Browse

My Account