UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Aung, Lwin Moe; Nyunt, Thi Thi Soe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    SQL is a special-purpose programming language designed for managing data held in a relational database management system. XQuery is a standardized language for combining documents, databases and Web pages. Among many ...
  • Oo, Nang Phyu Hnin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Rural's people development plays an importance role in a country. The analysis of status of social, commercial of Rural's people is very main status. By using this analysis, fill can the requirement space. So, the statuses ...
  • Htwe, Khin Mar; Naing, Thinn (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper is intended to implement shortest path way of transportation. To efficiently extract knowledge, Depth First Search (DFS), Breadth First Search (BFS), Uniform Cost Search (UCS) algorithms depend on the efficient ...
  • Linn, Thu Zar; Aung, Than Htike (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Association rule mining is widely used in business enterprise to analyze for marketing strategies and its good is to find interesting association or correlation relationship among a large set of data items. With massive ...
  • Wai, Chit Hnin; Soe, Khin Thanda (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Recommender Systems typically use techniques from collaborative filtering which recommend items that users with similar preferences have liked in the past and, also predict new rating by averaging ratings between pairs ...
  • Yee, Hnin Lai; Myint, Mu Mu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The healthcare system collects large amounts of healthcare data which unfortunately, are not mined to discover hidden information for effective decision making. Discovery of hidden patterns and relationships often goes ...
  • Aung, Yu Nandar; Zaw, Ei Phyu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Data Mining is a fast developing field of computer science and technology, which are helpful to enable end users for decision making process. One of the most important data mining processes is that of Association Rule ...
  • Phyo, Thazin; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper is presented the mining association rules among items in a large database of sales transactions. The mining of association rules can be mapped into the problem of discovering large itemsets which appear in ...
  • Ko, Su Linn; Aye, Hnin Hnin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A large number of expert systems require the use of forward chaining or data driven inference. Rulebased systems are really only feasible for problems for which any and all knowledge in the problem area can be written ...
  • Nwe, Thiri; Hlaing, Swe Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Analyzing the program conditional control flow the important technique using in program execution. Software errors are often caused mostly due to the complexity of software, programming errors, time pressure and changing ...
  • Tun, Hlaing Nwe; Win, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining is the process of digging trough large files and databases to discover useful, non-obvious and often unexpected trends and relationships. Association rules are popular representations in data mining. It finds ...
  • Khaing, Kyaw Thet; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, ...
  • Thazin, Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    With the fast progression of information exchange in electronic way, security is becoming more important in information transmission as well as in storage. To protect the confidential data from unauthorized access, several ...
  • Zaw, Su Mon; Hlaing, Swe Zin (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper basically deals with the availability of client programs on mobile devices that can invoke the remote execution of data mining task. By implementing mobile Web Services, remote users are allowed to execute ...
  • Tun, A Me (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data warehousing and online analytical processing (OLAP) are essential facilities for data analysis tasks supporting a user’s decision in a business. Data warehousing approach is to integrate information and heterogeneous ...
  • Hlaing, May Me Me; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the process of analyzing large data sets in order to find patterns. Mining frequent patterns is a fundamental and crucial task in data mining problems. The association rule mining is needed in order to ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Ant Colony Optimization (ACO) is a class of heuristic search algorithms that have been successfully applied to solving combinational optimization (CO) problems. The traveling salesman problem (TSP) is among the most ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Ant Colony Optimization (ACO) is a class of heuristic search algorithms that have been successfully applied to solving combinational optimization (CO) problems. The traveling salesman problem (TSP) is among the most ...
  • Min, Aung Chan (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In today computer security field, honeypot technology is rapidly maturing and various types of honeypots are establishing their role of countermeasure as viable and useful in modern network defense system. In this paper, ...
  • Win, Kay Thi; Aye, Zin May (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, an attempt is made to study the applicability of a general purpose, supervised feed forward neural network with one hidden layer, namely; Radial Basic Function (RBF) neural network. It uses relatively smaller ...

Search Repository



Browse

My Account