Conferences: Recent submissions

  • Min, Mar Mar; Thein, Yadana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, we have presented a Fingerprint Recognition System which combines both the features extraction by applying a statistical and geometry approach. First, the core point (CP) of the input fingerprint is detected. ...
  • Oo, Zin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Electronic clocks have predominately replaced the mechanical clocks. They are much reliable, accurate, maintenance free and portable. In general, there are two kinds of electronic clocks. They are analog clock and ...
  • Win, Sandar; Kyu, Khin Kyu; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper focuses on the PIC Based Water Level Control system including the complete circuit design. The complete circuit design consists of three major components: PIC (Programmable Interface Controller), AC motor and ...
  • Tun, A Me (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data warehousing and online analytical processing (OLAP) are essential facilities for data analysis tasks supporting a user’s decision in a business. Data warehousing approach is to integrate information and heterogeneous ...
  • Myint, Nan Khin Pyone; Khaing, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In Natural Language Processing (NLP), Machine translation (MT) is the application of computers to the task of translating texts from one natural language to another. In Natural Languages of Myanmar and Pa-Oh language, ...
  • Thazin, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast progression of information exchange in electronic way, security is becoming more important in information transmission as well as in storage. To protect the confidential data from unauthorized access, several ...
  • Aye, Yin Mon Nyein (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Increasing number of online auctions is challenging to those who are looking for good deals. Agent technology can be applied to E-commerce today in order to help users in buying things. Online auctions and negotiations ...
  • Tin, Myat Mon; San, Kalyar Myo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Reliable technology is not enough to ensure the security for the many application systems. Such several reliability deficiencies become the vital part of the security level in today wireless technology. Efficient cryptographic ...
  • Htun, Win Pa Pa; Han, Thwe’ Mu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address(MAC ...
  • Kyaw, Myat Mon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Geographic information system (GIS) offers great opportunities for the development of modern tourism application using maps .In this paper, we propose a tourism information system for supporting the location based service ...
  • Win, Nwe Nwe; Saw, Nang Tom Hawm (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In recent years, the need for personalized service has been increased. However, personalization services must be improved to lighten user's burden in the process of personalization and produce results that are more adaptable. ...
  • Ko, Lei Mon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    CBR (Case Based Reasoning) is an Artificial Intelligence methodology that provides the foundations for technology of intelligent systems. CBR receives increasing attention within the AI community.CBR is an analogical ...
  • Bu, Hkawn Ra Seng (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Syntactic analysis in Natural Language Processing (NLP) is one of the most important fields carried out in the world of artificial intelligence. NLP, a subfield of artificial intelligence and computational linguistics, can ...
  • Win, Kyaw Thu; Maw, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Agents have ability to communicate with one another in order to tackle the collectively problem that no single agent can, individually. They communicate with each other using Agent Communication Language (ACL). Agents also ...
  • Win, Toe Nai; Aye, Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Transmission Control Protocol (TCP) use cumulative acknowledgement scheme to provide reliable stream delivery service. Cumulative acknowledgement has one major inefficiency, it does not provide information about all ...
  • Cherry, Hnin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Rough set theory is based on the establishment of equivalence classes within the given training data. All of the data samples forming an equivalence class are indiscernible, that is, the samples are identical with respect ...
  • Aung, Su Mon; Htwe, Tin Tin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Decision tree learning algorithms have been successfully used in knowledge discovery. These algorithms use induction in order to provide an appropriate classification of objects in terms of their attributes, inferring ...
  • Khaing, Ye Ye; Pearl (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recovering the static structure of legacy source code is important in program understanding. A complex system can be simplified by a model exposing only some aspects of the system. In this system, we apply one of the most ...
  • Zaw, San Kyaw; Kyu, Khin Kyu; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In data and telecommunication, cryptography is necessary when communicating over untrusted medium. With the development of network and software technology, digital signature becomes more and more important for the ...
  • Khaing, Thal Ei; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Digital image encryption/decryption is to transform a meaningful image into a meaningless or disordered image in order to enhance the power to resist invalid attack and in turn enhance the security. This paper presents a ...

Search Repository



Browse

My Account