UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Mon, Aye Myat; Wai, Khaing Khaing (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Computer-controlled systems are the most interesting in today’s world. Fuzzy systems have been used in a wide of application in business, science, medicine, psychology, decision making and other fields. The production of ...
  • Win, Myint Myint; Shein, Swe Swe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, the computerized systems are popular in many business application areas and the online-based business systems are widely implemented for successful business. Taunggyi has many popular and interested places ...
  • Win, Thet Swe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper aims to develop a computerized thermometer using PIC and RS232 serial interfacing. The analogue temperature sensor is used to detect the real world temperature. The temperature sensor produces analogue changes ...
  • Ko, May Phuu; Nwe, San San (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Supporting uninterrupted services for distributed soft real-time applications is hard in resource-constrained and dynamic environments, where processoror connection failures and system workload changes are common. ...
  • Phyu, Aye Pwint; Nyein, May Kyi (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A database is a structured collection of data items that can be accessed concurrently by several transactions. The concurrency control in distributed databases is an important problem. This paper is intended to build ...
  • Shein, Su Mon; Nwe, Khine Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, distributed system become very popular in the operational environment of computer field. Heart of every distributed system is distributed file system in which informations are separated throughout the network as ...
  • Khaing, Hnin Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Concurrency control is the activity of coordinating concurrent accesses to a database in a multiuser database management system (DBMS). Concurrency control permits users to access a database in a multi-programmed fashion ...
  • Thu, Wer Wer Win; Thwel, Tin Thein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Most of the companies distribute their information per branch, ensuring that the data are mainly updated locally, by the branch where they were created. Examples of such companies could be hypermarkets and banks. So, ...
  • Myint, Khin Sandar; Htoon, Ei Chaw (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Commuting operations greatly simplify consistency in distributed systems. A Commutative Replicated Data Type (CRDT) is one where all concurrent operations commute. The replicas of a CRDT converge automatically without ...
  • Ko, Zin Phyo; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Distributed data exploits the fact that data accesses tend to reflect a locality of reference. A particular workgroup is more likely to access some data more often than others. By centralization of the system, the data ...
  • Moong, Nang Kham Line (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The Internet explosion has made enormous Information sources published as HTML pages on the internet. However, there are many redundant pages as being known web pages noise on the Web. For instance, almost all dot com ...
  • Thwe, Khaing Myat (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Scheduling is the most important in effective distribution of the resources. This paper presents a random search approach of genetic algorithm which is used to solve the packages to be allocated into varying size of ...
  • Thuzar, Hla; Tun, Khin Mar Lar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Finding graph isomorphism and sub graph isomorphism is an important problem in many applications which deal with data modelled as graphs. Graphs can represent biological networks at the molecular, protein, or species ...
  • Mon, Yi Yi; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Content-based image retrieval (CBIR) system retrieves relevant images based on their contents such as color, texture, shape, volume, spatial constraints and etc. In this paper, a CBIR system is implemented by using ...
  • Yee, Thiri The` Wut (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The revolution of mobile phones era has brought the innovative smartphones technology. As a result, research addressing information access in smartphones environment has proliferated. The important feature in security ...
  • Win, Saw; Myint, Zaw Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper use Contract Net Protocol based on multiagent system for purchasing car system. Normally , buyer look for desire car with search engine or buyer must go every Industrial Zone or Company (produce jeep car) ...
  • Zame, Sai Yee; Han, Thwe Mu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Architectural advances of modern systems have been added with control complexity, requiring significant effort in both design and verification. The control is the main part of the modern system. In modern system, it has ...
  • Moe, Khin Wai; Thein, Naychi Lai Lai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper describes the mobile agent-based music selection that generates dynamic playlist based on suggestions from multiple users and presents the design and development of music selection service which is implemented ...
  • Soe, Aye Aye; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes ...
  • Chit, Cherry; Htwe, Latt Latt (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Web services based business processes are generally composed of invocation to internal business processes outsourced by loosely coupled providers [4]. A key requirement for the success of web service-based integration of ...

Search Repository



Browse

My Account