UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Kyaw, Ei Mon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents e-book shopping system with cryptography by using RSA algorithm. Information security is a major issue today for any company or individual who conducts business electronically. Computer applications ...
  • Win, Zin Sandar; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the context of software engineering, the design patterns are reusable solutions to common problems and are one of the key mechanisms for implementing reliable and maintainable software. Design patterns are fundamental ...
  • Aung, Hsu Hmwaye; Myo, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Frequent pattern mining has become an important data mining task because finding such frequent patterns play an essential role in mining associations, correlation and many other interesting relationships among data. This ...
  • Hlaing, Khin Nilar; Khine, May Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The timely procurement and delivery of materials / equipment to yard, site and assembly locations requires a huge team effort and is paramount for the successful work done for shipyards and construction sites.The ERRP ...
  • Tun, Aye Myint; Min, Myat Myat (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    The decision support system (DSS) is an interactive system to support decision making. We intend to build the system as a decision support system using Analytical hierarchy Process (AHP) approach. In the proposed system, ...
  • Myint, Aye Sandar; Khine, May Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    XML document are frequently used in application such as business transaction and medical record involving sensitive information. Typically, parts of xml documents should be visible to users depending on their roles. ...
  • Htwe, Thanda; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Most of the Web page typically contains clutter unlike conventional data or text. It usually has such noise data as navigation panels, copyright and privacy notices, and advertisement. These noise data can seriously ...
  • Mon, Aye Chan; Khaing, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The most important field, enrollment and controlling the students’ data is very essential for all universities. Nowadays, computers are being used in the field of information in different way. When it is linked from one ...
  • Win, Toe Nai; Aye, Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Transmission Control Protocol (TCP) use cumulative acknowledgement scheme to provide reliable stream delivery service. Cumulative acknowledgement has one major inefficiency, it does not provide information about all ...
  • Htay, Thandar; Khaing, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Grammar checking is one of the most widely used tools within natural language processing. Many word processing systems today include grammar checker which can be used to point out various grammatical problem in a text. ...
  • Hlaing, Su Myat; Oo, Khwar Nyo (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Retrieval of an image is a more effective and efficient for managing extensive image database. Content Based Image Retrieval (CBIR) is a one of the image retrieval technique which uses user visual features of an image ...
  • Khaing, Cho Cho; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud ...
  • Aye, Htar Htar; Phyu, Kyaw Zar Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Peer to Peer system extends ideas about distributed computing and client server computing, blurring the distinction between clients and servers. The P2P paradigm was recently adopted in the database community to overcome ...
  • Sone, Aye Pyae; Nwe, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web page typically contains many information blocks. They are navigation panels, copyright and privacy notices and advertisements. These blocks are useful for business purposes. These blocks are called as the noisy ...
  • Nandar, Hsu Myat (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Cryptography is one of the most important sciences in the current area. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Nge, Khin Hnin; Kyu, Khin Kyu (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    This paper is represented for information security by using cryptography on important message and image steganography method on digital image. The secure system is implemented by combining for the encrypted message and ...
  • Soe, Akari Myint; Cho, Zarli (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The Internet as a whole does not use secure links, thus information in transit may be susceptible to interception as well. The important of reducing a chance of the information being detected during the transmission is ...
  • Thaung, Thein Than; Htike, Win Win (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Steganography is the art of hidden information in other information when communication is taking place. Many different carrier file format can be used, but audio waves are the most difficult and more secure because audio ...

Search Repository



Browse

My Account