Conferences: Recent submissions

  • War, Pan; Aye, Zin May (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper presents data transfer system between two users by applying a Trusted Center acts as a third party between two entities and it allows users to transfer data more reliable than other system by using its owns ...
  • Swe, Thin Thin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Security requirement is extremely needed to prevent various types of network attacks in some environment such as banking, exam question distribution, and military information exchange process. Files and data are transferred ...
  • Ei, Nyein Nyein; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    The general idea of the paper is to encrypt the selected data in the datasheet using Rijndael cipher, and then save the cipher text to the storage media. Rijndael is a substitution-linear transformation network with ten, ...
  • Hlaing, Thuzar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    A large and growing number of web pages display contextual knowledge based on keywords automatically extracted from the text of the page and this is a substantial source of revenue supporting the web today. In addition, ...
  • Thaung, Thein Than; Htike, Win Win (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Steganography is the art of hidden information in other information when communication is taking place. Many different carrier file format can be used, but audio waves are the most difficult and more secure because audio ...
  • Nge, Khin Hnin; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper is represented for information security by using cryptography on important message and image steganography method on digital image. The secure system is implemented by combining for the encrypted message and ...
  • Swe, Myat Myat; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Nowadays, technology is moving very fast and is growing demand for the security of data transferring and data collections over the network. To solve the security problems, Cryptography is very useful mechanism not only for ...
  • Samn, Eant Htoo; Tun, Nay Min (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Creating the common security basic is one of the most important tasks for all security system Cryptographic techniques are particularly important and indispensable components of the electronic communication system, ...
  • Bo, May Myint; Htoon, Ei Chaw; Maw, Aung Htein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Traffic congestion is a severe problem in many modern cities around the world. This system presents the simulation model of traffic light control for the four sets of traffic lights at the traffic crossing at junctions. ...
  • Minn, Ohn Mar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    The controlling water flow rate in today’s electronic presents ongoing challenges as today’s employ more and more electronics in smaller spaces. In this paper, a motor control system is designed and implemented to control ...
  • Oo, Wut Mone (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    A motor speed controller is to take a signal representing the demanded speed, and to drive a motor at that speed. A simple method of controlling the speed of a motor is to vary its voltage. Turning the dial increases or ...
  • Wai, Nu Htet (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    With the developing of technologies, people invented many kinds of robots such as autonomous robots, industrial robots, and mobile robots. One kind of important part of the robots is industrial robots that usually consist ...
  • Win, Tint Lwin Lwin; Naing, Thinn (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    “Dynamic Database Access and Storage System (DDASS)” provides its customers seamless mechanisms to create, and access their databases at the hosted site that are simulated on private cloud infrastructure. Usually the ...
  • Sithu, Mya (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    In Data Centers, QoS of the applications and optimized resource utilization is an important problem. With the advent of virtualization technology, underutilized physical servers in data centers can be managed by consolidating ...
  • Kyaw, Yan Naing (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Cloud Computing is a scalable distributed computing environment in which a large set of virtualized computing resources, various development platform and useful software are delivered as a services to customer as-pay-as-you-go ...
  • Wutyi, Hnin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Software as a Service (SaaS) is a way if delivering applications over the internet – as a service. SaaS is a one methodologies of Cloud Computing and also model of Software development. The problem of on-premise software ...
  • Kyaw, Myat (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Data storage is one of the important resources in cloud computing. There is a need to manage the data storage. This system is a cluster based data storage file system using Hadoop Distributed File System with the low cost ...
  • Kyaw, Cho Cho (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy protection play a vital role to build up the cloud computing environment. This system intends to implement secure cloud privacy system using Identity based Encryption (IBE) and Identity based Signature (IBS) ...
  • Dar, Moe San; Khin, Thu Zar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper presents the technique of embedding data in an audio signal by inserting low power tones and its robustness to noise and mixing if embedded wave audio. Information is an aspect that has a value like any other ...
  • Soe, Thinzar (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Steganography is the technique of hiding confidential information within any media. Embedding convert audio message in cover speech utterances for secure communication is considered. Information embedding by bit modification ...

Search Repository



Browse

My Account