Conferences: Recent submissions

  • Kyaw, Lett Yi; Phyu, Sabai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    High performance computing (HPC) is famous and latest trend in current research era. User request many jobs and they want to get accurate results and quick time within eye blink. There are so many processors running ...
  • Hlaing, Su Su Swe; Htun, Thaung Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Classification is one of the most popular data mining tasks with a wide ranges of application and lots of algorithms have been proposed to build scalable classifiers. Several data mining techniques and classification methods ...
  • Aung, Myat Thu; Cho, Aung (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the task of discovering interesting patterns from large amounts of data. These data can be stored in database. Data classification in data mining tasks is the process of building a model from available data ...
  • Mon, Soe Soe; Kham, Nang Saing Moon; Aung, Than Htike (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    In current years, there have been development of the number of intelligent tools based Radio Frequency Identification (RFID). RFID systems have been used successfully working to many areas such as transport, health ...
  • Saing, Myat Pen; Tun, Myint Thu Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Prediction of cost paves the way to the base line for development of industry. Before starting a business, it is imperative that one should know the potential of business to be cost-effective. As a business man, he is ...
  • Swe, Myo Myo; Myo, Nyein Nyein (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    The fast development of social networking sites such as imparting, sharing, putting away and overseeing huge data leads to pull in cybercriminals. Spammers misuse these social networking sites to abuse cyber laws for ...
  • Latt, Kyaw Zin; Ko, Lin Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication ...
  • Wai, Htet Su; Lwin, Mar Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The use of web interfaces across organizations’ applications for cooperating and supporting has come to a dramatic increase in number of users to get effective systems. Current Web technologies employed to build up web ...
  • Swe, Yee Yee; Tun, Myint Thu Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Capacity planning is the process of determining the production capacity needed by an organization to meet changing demands for its products. A discrepancy between the capacity of an organization and the demands of its ...
  • Zin, Than Yaw; Lwin, Mar Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Many business enterprises accumulate large quantities of data from their day to day operations. Therefore, in this system, huge amounts of customer purchase beauty accessories data are collected daily by supplier representatives ...
  • Myat, Yin Yin; Mon, Ohmmar Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Pseudorandom Number Generators (PRNGs) are computational algorithms that produce long sequence of random results, which are determined by a shorter initial seed or key. Elliptic curve cryptosystem is a public key cryptosystem. ...
  • Zaw, Kyaw Nyi Nyi; Phyu, Ei The (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Online auctions have become an effective approach in the buying and selling process, employed in the rapidly emerging Internet-based electronic commerce platforms. Through internet, the limitation of distance and region ...
  • Phyu, Aye Pwint; Nyein, May Kyi (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A database is a structured collection of data items that can be accessed concurrently by several transactions. The concurrency control in distributed databases is an important problem. This paper is intended to build ...
  • Nwe, Aye Aye; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the ...
  • Kyaw, Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A number of solutions have been proposed for the problem of mutual exclusion in distributed systems. This paper is intended to simulate a system monitoring the number of vacancies in a car parking using Ricart-Agrawala’s ...
  • Win, Phyoe Su Su; Mon, Thet Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The general elements of transaction processing are data capture and validation, transaction-dependent processing steps and database maintenance. Database Management Systems (DBMS) are among the most complicated applications. ...
  • Win, Zin Me Me; Maw, Tin Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the significant increment of today’s network, there is a decrease in the efficiency of the network. The performance and reliability of the Internet depend, in large part, on the operation of the routing protocols. ...
  • Myat, Nway Htet; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital ...
  • Than, Nwe Ni; Maw, Tin Win (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The need for random and pseudorandom numbers arises in many cryptographic applications. Generating high-quality randomness is a vital part of many cryptographic operations. This paper presents some aspects of selecting and ...
  • Soe, Nay Lin; Phyu, Ei The` (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Mobile Agent technology has the ability to travel from host to host in different or same network. Mobile Agents can migrate on themselves, their program and their state across the network and can execute the process at ...

Search Repository



Browse

My Account