Conferences: Recent submissions

  • Lwin, Hnin Thant; Mya, Aye Pa Pa (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, information system has been developed and played key role in live of human beings. By applying the developme nt of information system, user can search the desired information from the inter net . However, user ...
  • Thida, Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper proposes a robust method for wheeze sound detection. The presented approach is based on a time series regularity measure called sample entropy of a time-frequency distribution (Gabor Spectrogram). First, the ...
  • Win, Than Htun; Hnin, Mya Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents an algorithm which extends the fuzzy k-means algorithm for clustering categorical objects. In this algorithm, use a simple matching dissimilarity measure to deal with categorical objects and uses a ...
  • Swe, Kyaw Ei Ei; Aung, Sint Sint (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cluster is refers to identifying the number of subclasses of c-clusters (2d” cd” n). There are two kinds of c partition of data: hard (or crisp) and soft (or fuzzy) . Two important issues are to consider how to measure ...
  • Lwin, Pyae Phyo; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Intelligent control of home appliances has attracted much theoretical attention, as well as becoming a major factor for industrial and economic success and rapid market penetration. A fuzzy control that uses rules based ...
  • Zaw, Thiha; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A fuzzy decision system for air helping air-traffic experts in controlling aircraft velocities and in keeping an aircraft flight within several constraints established of air lane section. Automatic systems for air-traffic ...
  • Thein, Nan Sandar; Oo, Hlaing Thida (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The process of student evaluation is based on a procedure where we assume that the student belongs just to one set in a completely specified way, for example the set of excellent students, or the set of regular students. ...
  • Moe, Kay Khaing; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A microcontroller based electronic circuit designed and constructed to do arithmetic logic unit (ALU) operation. Sixteen switches are used as inputs by using LED indicators. The output results are displayed with 8 LED ...
  • Zaw, Myo Min; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The implementation of a helicopter descending and landing control system is presented. Descending and landing is to maintain the glide slope and heading and to reduce gradually airspeed and height from a point of altitude ...
  • Khaing, Aye Aye; Khaing, Daw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Most of the electronic stores have a problem when interacting with their customer to sell the goods. They have to make a lot of conversation with customer, discussing the requirement of the customer and the availability ...
  • Maung, Arkar Aye; Hole, Gilmour (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, everybody is facing many problems with making decisions and future planning in current topic in global and regional works all over the world. However, problems for the multiple criteria decision- making are ...
  • Tun, Nyan Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Information and access to information is important in modern society. Network security is necessary to counter the threats and make network safe to use. There are some methods to prevent eavesdropping or falsification ...
  • Nyein, Khin Thara Phyu; Thein, Nilar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Telegraphy message security system relies on the privacy and authentication of information, which requires implementation of cryptographic functions, and measures are needed to protect data during their transmission. A ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Win, Kyaw Thura; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure communication in physically vulnerable networks depends upon encryption of material passed between machines. It is feasible for each computer in the network to encrypt and decrypt material efficiently with arbitrary ...
  • Htet, Yi Mon; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Encryption is used to securely transmit data in open networks. It can also be defined as the process of obscuring information to make it unreasonable without special knowledge. Encryption is the process of transformation ...
  • Htet, Lwin; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There ...
  • Aung, Theingi Nwe; Hlaing, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    With the rapid advances in security threads, more reliable security techniques have become the business necessity. The security services must assure that the communication is not refered with in such a way that the party ...
  • Than, Myo Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In computer and network systems, the private access systems use cryptosystems that provide to certain and ensure data of information that are authentic and secure. This paper will develop the secure bank transaction ...
  • Moe, Hlwan (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure exchange of secret messages over public channel plays a very important role of secret communication. The use of Steganography is much less threatening than the use of cryptography because after encoding stego ...

Search Repository



Browse

My Account