Conferences: Recent submissions

  • Thura, Kyaw; Kyu, Khin Kyu; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is intended for changing the satellite communication link and design to proper and more secure link and design. This paper demonstrate about the current technologies using in satellite and compare with new ...
  • Aye, Chit Hnin; Pearl (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Evidently there is a tremendous proliferation in the amount of information found today on the largest shared information source, the World Wide Web. Information Retrieval System tries to save the users access time by ...
  • Nyunt, Lwin Si Thu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data warehousing and online analytical processing (OLAP) are essential elements of decision support system, which has increasingly become a focus of the database industry. A data warehouse is an integrated and time-varying ...
  • Khin, Naw Thiri Wai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Mobile agents are autonomous programs that can migrate i n a heterogeneous network to perform tasks on behalf of their owners. Mobile agents also raise several security issues related to the data carried by an agent ...
  • Yu, Thin Thin; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Security requires the integration of people, process, and technology. Strong information encryption and decryption scheme are crucially important for information technology. Nowadays, secret sharing is one popular ...
  • Htun, Kay Khine (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    PIC microcontroller has become a real powerhouse with regards to available support. In many ways, the PIC microcontroller has more support available than other electronic devices. Microcontroller is a complete computer ...
  • Lwin, Thi Tar; Thein, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Worldwide, businesses continually increase their dependence on IT systems for routine business processes. The business processes which directly rely on information systems and the supporting IT infrastructure often ...
  • Tun, May Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Classification is a data mining or machine learning technique used to predict group membership for data instances. Several major kinds of classification method including decision tree induction method, Bayesian networks ...
  • Khaing, Kyaw Thet; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, ...
  • Thein, Mi Chaw Mon; Thein, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In large scale wireless sensor networks clustering is often used for improving energy efficiency and achieving scalable performance. In the clustered environment, data gathered by the nodes is transmitted to the base ...
  • Mon, Ei Ei; Tun, Khin Nwe Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    We propose a methodology for clustering XML documents on the basis of their structural similarities. This research combines the methods of common XPath and K-means clustering that improve the efficiency for those XML ...
  • Myint, Ei Ei Pe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Music is the effective communication medium among people. Studying music mood can help in music understanding, music retrieval, and some other music-related applications. This paper presents a hierarchical framework ...
  • Hliang, Yi Yi; Tun, Khin Nwe Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, XML plays an important role as a de facto standard online data exchange mechanism. In this paper, we present NFA-based filtering technique of XML document for multiple XPath queries using ontology. In our ...
  • Khin, Thet Thet; Sein, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper focuses on the detection of target object from various kinds of objects and camouflaged scene. We offer to apply a target detection method that developed based on the nonlinear correlation approach. The ...
  • Lwin, Thandar; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The task of detecting duplicate records that represents the same real world object in multiple data sources, commonly known as duplicate detection and it is relevant in data cleaning and data integration applications. ...
  • Htwe, Ah Nge; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image resampling is a process which change the size of an image. It generates output image of the specified dimension with the help of the interpolation techniques. The up-sampled images are lost fine detailed information ...
  • Aung, Aye Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    During recent years, Distributed Hash Table (DHTs) have been extensively studied through simulation and analysis. As a fundamental problem in DHT based P2P system, lookup consistency and load balancing is important to avoid ...
  • Hlaing, Su Su; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Schema Matching can be efficiently done by using ontology concepts. Ontology matching is one of the well known topics of Semantic Web research. With the development and the use of a huge variety of data (e.g. DB schemas, ...
  • Shein, Khin Phyu Phyu; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    There has been a growing concern on ontology due to its ability to explicitly describe data semantics in a common way, independently of data source characteristics, providing a schema that allows data interchanging among ...
  • Myint, Aye Sandar; Khine, May Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    XML document are frequently used in application such as business transaction and medical record involving sensitive information. Typically, parts of xml documents should be visible to users depending on their roles. ...

Search Repository



Browse

My Account