UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Khaing, Thal Ei; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Digital image encryption/decryption is to transform a meaningful image into a meaningless or disordered image in order to enhance the power to resist invalid attack and in turn enhance the security. This paper presents a ...
  • Wai, Hnin Yu; Nwe, Khine Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, it is important that information is sent confidentially over the network without fear of hackers or unauthorized access to it. Cryptography was created as a technique for securing the secrecy of communication ...
  • Khaing, Ei Ei; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Todays, computers security is needed to protect data and to thwart the hackers. Cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable ...
  • San, Thin Thiri; Maw, Aung Htein (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    MANET (Mobile Ad hoc Network) is self organizing and self configuration and self controlled network without the need of any base station AP(Access Point). Mobility of nodes in MANET causes ever changing topologies. As ...
  • Aung, Tharyar; Tun, Khin Nwe Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In computer science and Web mining which is an interdisciplinary subfield of computer science, is the computational process of discovering patterns in web log files. The overall goal of the web mining process is to ...
  • Cing, Dim Lam; Thwin, Khin Lay (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Case-based Reasoning (CBR) is a recent approach to problem solving and learning that has got a lot of attention over the last few years. CBR is an Artificial Intelligence method based on a plausible cognitive model of human ...
  • Thuzar, Pyae Phyo; Kham, Nang Saing Moon (2017-12-27)
    Multilayer feedforward networks are one of the most used neural networks in various domains because of their universal approximation ability. One of the popular algorithms for training multilayer feedforward network ...
  • Aung, Theint Theint Ei Htet; Thein, Nilar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Information security is becoming more important in data storage and transmission. Because of widely used images in security process, it is the important confidential image data from unauthorized access. The original ...
  • Han, Wai Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The presence of background noise in recorded speech reduces the quality of speech. It can also degrade the performance of other systems, such as speech compression, speech recognition, and speaker authentication. The ...
  • Soe, A Nwe; Myo, Khin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, every organization is needed not only to record but also to manage and analyze a huge amount of data. Data warehouse and OLAP techniques are valuable tools for today’s competitive, fast evolving world. There have ...
  • Aung, Htet Htet (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Artificial neural networks(ANNs) are computing models for information processing and pattern identification. An ANN is a network of many simple computing units called neurons or cells, which are highly interconnected and ...
  • Aung, Ei Mon Mon; Min, Mar Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Voice Activity Detection (VAD) is used to detect the presence of speech in an audio signal. VAD plays an important role as a preprocessing stage in numerous audio processing applications. In Voice over IP (VoIP) and ...
  • Linn, Kyi Sein; Ko, Lin Min (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In today world use high speed computers. Communication between one computer and another or between the computer and its peripheral devices must be as error free as possible. However, error free data transmission in ...
  • Aung, Thida; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Pushdown Automata (PDA) is one of the hierarchies of automata theory models appropriate for the design of compiler. This system implemented to detect the compile errors of the HTML program when basic beginners who write ...
  • Shwe, Myo Myat; Thein, Naychi Lai Lai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Petroleum exploration is a high risk business. Consulting geologists predicts the probable existence of oil based on the geological evidence such as reservoir rocks, source rocks, sealed rocks, trap, recovery factor and ...
  • Yadanar, Aye Mya; Maw, Aye Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Most Nursery Care Schools support to families and improve the living standards of the children in terms of education, health and nutrition. Nursery Care School acquires children’ health condition and knowledge to accept ...
  • Hlaing, Hnin Wai Wai; Tun, Myint Thuzar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, computer based medical system is playing a role in assisting both diagnosis and treatment. Thus, this system intends to provide information for junior traditional medicine practitioners and user who interested ...
  • Kyaw, Yan Naing (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Cloud Computing is a scalable distributed computing environment in which a large set of virtualized computing resources, various development platform and useful software are delivered as a services to customer as-pay-as-you-go ...
  • Yar, Thar; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence (AI) is the computational part of the ability to achieve goal. A search algorithm, broadly speaking is an algorithm that takes a problem as input and returns a solution to the problem, usually ...
  • Maw, Hnin Yu; Sandar, Khin; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In many application domains, classification of complex measurements is essential in a diagnosis process. Correct classification of measurements may in fact be the most critical part of the diagnostic process. In this system, ...

Search Repository



Browse

My Account