UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Title

Browsing Third Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Maung, Tin Win; Thein, Thandar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today’s connected society requires secure information system to preserve data privacy and authentication un critical applications. This paper intends to implement secure information system for critical applications. The ...
  • Htwe, Nyo Nyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system is implemented to improve the clarity of audio echo speech signal. Acoustic echo cancellation (AEC) greatly enhances the audio quality of loudspeaker enclosure microphone (LEM) system. The presented ...
  • Wai, Shwe Soe; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    RC5 and RC6 block ciphers are standard cryptographic Encryption Algorithm for Digital Images. RC5 and RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images. Experiments ...
  • Aung, Kyaw Htet; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Wireless technology , by its nature , violates fundamental security principles. Wireless messages move through the free-space environment on certain spectrum allocations, it is vulnerable to security threats. Common ...
  • Htwe, Tin Maung; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Internet and network applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms ...
  • Thein, Myo Min; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today. More and more information has been transmitted over the World. The information is not only text, but also audio, image, and other multimedia Images have been widely used in our daily life. This paper presents on ...
  • Khin, KayKay Thi Wut Hmone; Oo, Lwin Lwin (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today, people use widely computer networks to communicate from one place to another. When people use computers, they will need necessary to protect the information and to thwart the hackers. So, people interconnect their ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Han, Hane Thu; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The role of cryptograph is important for data security. Many cryptographic techniques can be used to keep security of sensitive data. Information is an arm of Military as well as the security of information is it’s life. ...
  • San, Aye Aye; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-based reasoning (CBR) has become a successful technique for developing medical diagnosis systems. CBR is an approach to knowledge-based problem solving and decision support. This paper presents CBR methodology and ...
  • Zaw, Myo Min; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The implementation of a helicopter descending and landing control system is presented. Descending and landing is to maintain the glide slope and heading and to reduce gradually airspeed and height from a point of altitude ...
  • Moe, Kay Khaing; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A microcontroller based electronic circuit designed and constructed to do arithmetic logic unit (ALU) operation. Sixteen switches are used as inputs by using LED indicators. The output results are displayed with 8 LED ...
  • Soe, Yan Naung; Nyunt, Thi Thi Soe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Multi-level Marketing (MLM) system has become very popular in international marketplace because of its independent distributors development system and commission payment method. The nature of Multi-level Marketing system ...
  • Ei, Min Min; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In medical field, it is very difficult to get correct Diagnosis because there are many possible diseases in each case. And it is also important to get correct diagnosis as soon as possible to save lives of people. It ...
  • Swe, Aung Myo; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, helpdesk are especially important in providing technical information about procedures and regulations , such as answering questions about a specific problem. Case-Based Reasoning is one of the most successful ...
  • Min, Zay Yar; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the technology grows rapidly, many people take a great interest in computer and then computerbased methods are increasingly used to improve the quality of the medical services. Human experts in medical field ...
  • Naing, Tint Htoo; Nge, Mi Mi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-base Reasoning (CBR) is an artificial intelligent approach to learn and solve the problem emphasizes the role of prior experience. Case-base reasoning methods have to deal with the current problem to identify the ...
  • Zodingliana (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptograph is crucial to communicating medium. The use of cryptography today becomes widespread, not just in military situation but for commercial and private purposes. So the electronic messages and documents which ...
  • Win, May Thu; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, the security of the information exchanged is very important. In this paper, MD5 is used for computing the hash value of the message and RSA is used for signing the message and verifying the digital signature. ...
  • Kyaw, Wai Phyo; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In distributed Authentication between clients and servers using public key cryptography approach, both client and server do not need to maintain keys with Key Distribution Center (KDC). Maintaining keys at the server ...

Search Repository



Browse

My Account