UCSY's Research Repository

Third Local Conference on Parallel and Soft Computing

Third Local Conference on Parallel and Soft Computing

 

Recent Submissions

  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Htein, Aung Thet (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Data mining is process of pattern extraction from a large collection of datasets.Main goal of data mining is to discover the frequent itemsets(patterns).Sequential pattern mining is an important data mining problem that ...
  • Oo, Myat Htun; Htun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Yan, Phyo Wai; Thida, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Clustering algorithms are data attractive for the last class identification in spatial databases. This system presents the new clustering algorithm DBSCAN (Density-Based Spatial Clustering of Applications with Noise). ...
  • Win, Than Htun; Hnin, Mya Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents an algorithm which extends the fuzzy k-means algorithm for clustering categorical objects. In this algorithm, use a simple matching dissimilarity measure to deal with categorical objects and uses a ...
  • Swe, Kyaw Ei Ei; Aung, Sint Sint (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cluster is refers to identifying the number of subclasses of c-clusters (2d” cd” n). There are two kinds of c partition of data: hard (or crisp) and soft (or fuzzy) . Two important issues are to consider how to measure ...
  • Lwin, Pyae Phyo; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Intelligent control of home appliances has attracted much theoretical attention, as well as becoming a major factor for industrial and economic success and rapid market penetration. A fuzzy control that uses rules based ...
  • Zaw, Thiha; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A fuzzy decision system for air helping air-traffic experts in controlling aircraft velocities and in keeping an aircraft flight within several constraints established of air lane section. Automatic systems for air-traffic ...
  • Thein, Nan Sandar; Oo, Hlaing Thida (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The process of student evaluation is based on a procedure where we assume that the student belongs just to one set in a completely specified way, for example the set of excellent students, or the set of regular students. ...
  • Moe, Kay Khaing; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A microcontroller based electronic circuit designed and constructed to do arithmetic logic unit (ALU) operation. Sixteen switches are used as inputs by using LED indicators. The output results are displayed with 8 LED ...
  • Zaw, Myo Min; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The implementation of a helicopter descending and landing control system is presented. Descending and landing is to maintain the glide slope and heading and to reduce gradually airspeed and height from a point of altitude ...
  • Khaing, Aye Aye; Khaing, Daw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Most of the electronic stores have a problem when interacting with their customer to sell the goods. They have to make a lot of conversation with customer, discussing the requirement of the customer and the availability ...
  • Maung, Arkar Aye; Hole, Gilmour (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, everybody is facing many problems with making decisions and future planning in current topic in global and regional works all over the world. However, problems for the multiple criteria decision- making are ...
  • Tun, Nyan Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Information and access to information is important in modern society. Network security is necessary to counter the threats and make network safe to use. There are some methods to prevent eavesdropping or falsification ...
  • Nyein, Khin Thara Phyu; Thein, Nilar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Telegraphy message security system relies on the privacy and authentication of information, which requires implementation of cryptographic functions, and measures are needed to protect data during their transmission. A ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Win, Kyaw Thura; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure communication in physically vulnerable networks depends upon encryption of material passed between machines. It is feasible for each computer in the network to encrypt and decrypt material efficiently with arbitrary ...
  • Htet, Yi Mon; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Encryption is used to securely transmit data in open networks. It can also be defined as the process of obscuring information to make it unreasonable without special knowledge. Encryption is the process of transformation ...
  • Htet, Lwin; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There ...
  • Aung, Theingi Nwe; Hlaing, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    With the rapid advances in security threads, more reliable security techniques have become the business necessity. The security services must assure that the communication is not refered with in such a way that the party ...

View more