Conferences: Recent submissions

  • Hlaing, Htike Ayar; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the current computing community, secure data transfer is limited due to its attack made on data communication. Solutions which came to the rescue are cryptography and steganography. Cryptography is often used in ...
  • Aung, Ywel Nandi; Chan, Khin Ei Ei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper implements an efficient hybrid encryption that combines symmetric key encryption, one time pad (OTP) and asymmetric key encryption, Elliptic Curve Cryptography (ECC). Elliptic Curve Key Establishment Protocol ...
  • Mon, Myat Myat; Khine, May Aye (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Cloud computing is an interested and big developing computing technology that maintain data servers and service huge applications to provide end users in many different organization. Although cloud computing gives many ...
  • Kyaw, Wa Shwe Lwin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Decision Support System (DSS) are integrated with set of computer tools and that allow decision makers to interact directly with the computers to create information useful in making decisions. DSS helps managers and ...
  • Mung, Pau Suan; Phyu, Sabai (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Healthcare industry is an ever-increasing rise in the large amount of records such as doctors, patients, medicines and medical history. Although previous medical records are beneficial for not only individual but also ...
  • Aye, Chan Mya; Mon, Thet Su (Fifth Local Conference on Parallel and Soft Computing, 2010-01-16)
    In distributed system, the database can be replicated in multiple servers stored at different sites. Replication is a key to providing high availability and fault tolerance in distributed systems. A faulttolerant service ...
  • Sein, Ma Htaw; Win, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Sequential pattern mining is an important data mining problem with broad applications. Most of the sequential pattern mining methods, such as GSP (Generalized Sequential Pattern) and AprioriAll explore a candidate ...
  • Lwin, Nang Khine Zar; Tun, Nay Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Association rule mining, is one of the most important and well researched techniques of data mining. It is the process of discovering large itemsets appeared in a sufficient number of transactions. Large itemsets from ...
  • Aye, Saw Mya; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Voice over Internet Protocol (VoIP) is one of the quickest developing Internet services and steadily replaces traditional telephony. VoIP application provides a means of transmitting voice communication over an IP based ...
  • Yee, San Su Su; Thein, Yadana (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper contribute recognition and detection erratum for Myanmar handwritten compound words. MICR (Myanmar Intelligent Character Recognition) is used for the character recognition. Because this method is interesting ...
  • Maung, Cherry; Thein, Yadana (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper contributes Myanmar Printed Character Recognition with format. This system consist recognition and formatting. It recognizes for Myanmar Portable Document Format (.pdf) such as font size, font style, alignment ...
  • Maung, Cherry; Thein, Yadana (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper contributes Myanmar Printed Character Recognition with format. This system consist recognition and formatting. It recognizes for Myanmar Portable Document Format (.pdf) such as font size, font style, alignment ...
  • Kyaw, Phyo Ma Ma; Myaing, Khin Lay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Combination of Fuzzy logic and Genetic Algorithm is used for searching of optimal solutions. To obtain the globally optimal rules, the Fuzzy rulebases are searched by means of Genetic Algorithm. In Fuzzy inference ...
  • Phyu, Poe Ei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Neural Network technologies are applied in many fields. Neural Networks (NN) rely on the inner structure of available data sets rather than on comprehension of the modeled processes between inputs and outputs. ...
  • Chit, Aye Myat Myat Mon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The development of communication technology, security is a major concern. The widely used image in communication process is vital to protect important image data from unauthorized access. In this paper, the digital ...
  • Oo, Su Myat Mon; Aye, Khin San (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital music is one of the most important data types, distributed by the Internet. Automatic musical genre classification is very useful for music indexing and retrieval. A method to recognize the genre of music audio ...
  • Myint, Aye Thinzar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital Watermarking has been proposed as a mean to identify the owner or distributor of digital data. It involves the concealment of data within a discrete audio file. Audio Watermarking has been proposed as a possible ...
  • Zin, Moh Moh Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    With the development of computer and expanding its use in different areas of life and work, the issue of information security has become increasingly important. The art of sending and displaying the hidden information ...
  • Aung, Htat Htat; Oo, Hlaing Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper, an approach is built to automatically detect acoustic events that are produced in a meeting or lecture room environment. Six audio classes are to be classified through this approach. The classes considered ...
  • Tin, Thandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Classification is a form of data analysis that can be used to extract models describing important data classes or to predict future data trends. Data classification is a two step process. This system is to study the ...

Search Repository



Browse

My Account