UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Htaik, Ei Yamin; Aye, Aye (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A popular method for creating an accurate classifier from a set of training data is to train several classifiers, and then to combine their predictions. One way to generate an ensemble of simple Bayesian classifiers ...
  • Aye, Khin Myo; Yuzana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Naive Bayes is one of the most efficient and effective inductive learning algorithms for machine learning and data mining. Its competitive performance in classification is surprising, because the conditional independence ...
  • Aung, Thandar; Win, Thin Zar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data Mining is the process of storing through large amount of data and picking out relevant information. Classification can be used as in the form of data analysis that can be used to extract models describing the important ...
  • Saing, Myat Pen; Tun, Myint Thu Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Prediction of cost paves the way to the base line for development of industry. Before starting a business, it is imperative that one should know the potential of business to be cost-effective. As a business man, he is ...
  • Han, Aye Mya (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This system presents an efficient approach for discovering significant patterns from the heart disease database for heart attack prediction. The heart disease data warehouse is clustered using Kmeans clustering algorithm ...
  • Lin, May Phyo Wai; Oo, Khine Khine (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The goal of the proposed system is to derive models for forecasting the final price of ongoing auction. The forecasting task is important not only to the participants of an auction who compete against each other for the ...
  • Phyu, Poe Ei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Neural Network technologies are applied in many fields. Neural Networks (NN) rely on the inner structure of available data sets rather than on comprehension of the modeled processes between inputs and outputs. ...
  • Win, Swe Swe; Nwe, San San (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In business environment, banking system plays one of the main roles in buying and selling transactions. A transaction is a logical unit of work. A transaction processing system (TPS) is a system that monitors transaction ...
  • Kyaw, Htet Htet; Nwe, Khine Moe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A transaction is a logical unit of work. Transaction Processing Systems (TPS) are the heart of the business operations today. A TPS may fail for many reason such as system failure, human errors, hardware failure, ...
  • Aung, Nwe Mon Mon; Moe, Myint Myint (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference ...
  • Kyaw, Cho Cho (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy protection play a vital role to build up the cloud computing environment. This system intends to implement secure cloud privacy system using Identity based Encryption (IBE) and Identity based Signature (IBS) ...
  • Nwey, Zun Nyein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Privacy information retrieval (PIR) can be viewed as a service between a user and a database. Private retrieval of public data is critical in these days when a client wants to query a public data service without expressing ...
  • Wai, Saw Yu Yu; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Computerized record linkage is increasing used in health information systems. Medical record linkage expresses the concept of collecting health care records into commutative personal file, starting with birth and ending ...
  • Than, Zin Mar; Htway, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A multi-agent system is a collection of software agents that work in conjunction with each other. This thesis emphasizes the personalization Agent for Tourism Advisor system. The Personalization Agent retrieves the ...
  • Yi, Win Win (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is used the various data from Spinning and Weaving Factory (Sarlingyi). The products of factory have four types. There are 1/21 fiber, 1/32 fiber, 1/24 fiber and 1/40 fiber. In this system, the maximum profit ...
  • Aung, Yin Pa Pa; Htoo, Nay Zar Chi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptography makes secure websites and electronic safe transmission possible. For a web site to be secure all of the data transmitted between the computers where the data is kept and where it is received must be encrypted. ...
  • Hlaing, Ei Phyu; Lwin, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Many people use the internet or the web as a source of information. In an enterprise that uses the internet, a reverse proxy server is a server that acts as an intermediary between a workstation user and internet so that ...
  • Swe, Khin Thet Nwe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents how to get data integrity and authentication in receiver. Signing process is performed in sender and verifying process is performed in receiver. In signing process, sender computes hash value of ...
  • Oo, Aung Nway (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Proxy blind signature, which combines the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original ...
  • Phyo, Su Hlaing (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Replication is important in distributed environment. Replication provides users with their own local copies of data. These local, updatable data copies can support increased localized processing, reduced network traffic ...

Search Repository



Browse

My Account