UCSY's Research Repository

Browsing Local Conference on Parallel and Soft Computing by Title

Browsing Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Hlaing, Su Su Swe; Htun, Thaung Myint (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Classification is one of the most popular data mining tasks with a wide ranges of application and lots of algorithms have been proposed to build scalable classifiers. Several data mining techniques and classification methods ...
  • Aye, YinYin; Thant, Khin Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The concurrency control of a distributed system is to ensure that the consistency of the database. The concurrency control mechanism is becoming useful in the ordering system. This paper introduces a concurrency control ...
  • Kyaw, Win Thiri; Oo, Ingyin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Extensible Markup Language (XML) is fast emerging as the domain standard for representing data in the World Wide Web. Xpath is a l;anguage for addressing, structural parts of an XML docvuments. The Xpath language is ...
  • Kyi, May Thynn; Kham, Nan Si (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Many in top managements extremely need high quality information for various time periods. Most organizations are facing some problems concerning data information gap. Decision support data usually needs to be collected ...
  • Thura, Kyaw; Kyu, Khin Kyu; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper is intended for changing the satellite communication link and design to proper and more secure link and design. This paper demonstrate about the current technologies using in satellite and compare with new ...
  • San, Khine Aye; Thein, Thin Lai Lai (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper implements the waiting line of clinic by using Queuing Theory to save the time-limit. The system is using the multiple queue line. One is for emergent patients, one is for old patients, another one is for new ...
  • Thandar, Aye Mya (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper aims to scale up the Naïve Bayesian Classifier using Genetic and Decision Tree for feature selection. The main reason is to predict patient's breast cancer result based on their diagnosis using this scaled ...
  • Lwin, Khin Moe; Soe, Khin Mar (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    This paper proposed an approach of searching the optimal bus-routes based on data mining technology called Frequent Subgraph Mining (FSM).FSM is an important task for exploratory data analysis on graph data. Many approaches ...
  • Hein, Nay Zaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Combinatorial reasoning underlines all analysis of computer systems. It plays a similar role in discrete operational research problems. Two of the most basic mathematical aspects of computer science concern the speed ...
  • Nwet, Khin Thandar; Oo, Nyo Nyet Nyet (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In Myanmar language, the spoken language may be different with the written language in many cases. In Myanmar, the words are the same phonetically in pronunciations with different spellings such as ကုနရန်, ယန်ဂုန်, ...
  • Nwe, Win Hay Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Conventional database query methods are inadequate to extract useful information from huge data banks. Cluster analysis is one of the major data analysis methods, and process of grouping a set of physical or abstract ...
  • Aye, Nang Yupar; Aung, Nang Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper studies Searching Methods. Among the searching methods, this system emphasized the hill climbing. Hill climbing tries to expand the node closet to the goal; it evaluates nodes by using heuristics method. This ...
  • Moe, Hlwan (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure exchange of secret messages over public channel plays a very important role of secret communication. The use of Steganography is much less threatening than the use of cryptography because after encoding stego ...
  • Than, Myo Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In computer and network systems, the private access systems use cryptosystems that provide to certain and ensure data of information that are authentic and secure. This paper will develop the secure bank transaction ...
  • Aung, Theingi Nwe; Hlaing, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    With the rapid advances in security threads, more reliable security techniques have become the business necessity. The security services must assure that the communication is not refered with in such a way that the party ...
  • Wun, Ei Mon Thu; Phyu, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper describes secure transaction of credit card system. The credit card requires the provision of purchaser’s credit card details to the service provider for goods and services purchased over the network. Therefore, ...
  • Than, Shwe Sin Myat; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...
  • Mon, Kaung Myat; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it ...
  • Nandar, Saw Mya; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. There are a lot of image encryption algorithms. Because of ...

Search Repository



Browse

My Account