UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Title

Browsing Third Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Min, Zay Yar; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the technology grows rapidly, many people take a great interest in computer and then computerbased methods are increasingly used to improve the quality of the medical services. Human experts in medical field ...
  • Naing, Tint Htoo; Nge, Mi Mi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-base Reasoning (CBR) is an artificial intelligent approach to learn and solve the problem emphasizes the role of prior experience. Case-base reasoning methods have to deal with the current problem to identify the ...
  • Zodingliana (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptograph is crucial to communicating medium. The use of cryptography today becomes widespread, not just in military situation but for commercial and private purposes. So the electronic messages and documents which ...
  • Win, May Thu; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, the security of the information exchanged is very important. In this paper, MD5 is used for computing the hash value of the message and RSA is used for signing the message and verifying the digital signature. ...
  • Kyaw, Wai Phyo; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In distributed Authentication between clients and servers using public key cryptography approach, both client and server do not need to maintain keys with Key Distribution Center (KDC). Maintaining keys at the server ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Han, Wai Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The presence of background noise in recorded speech reduces the quality of speech. It can also degrade the performance of other systems, such as speech compression, speech recognition, and speaker authentication. The ...
  • Aung, Ei Mon Mon; Min, Mar Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Voice Activity Detection (VAD) is used to detect the presence of speech in an audio signal. VAD plays an important role as a preprocessing stage in numerous audio processing applications. In Voice over IP (VoIP) and ...
  • Yar, Thar; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence (AI) is the computational part of the ability to achieve goal. A search algorithm, broadly speaking is an algorithm that takes a problem as input and returns a solution to the problem, usually ...
  • Htun, Sai Zaw Moe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper studies the Minimum Spanning Tree Methods. A graph is a collection of nodes and edges, but has no rules dictating the connection among the nodes. All trees are graphs. A tree is a special case of graph in ...
  • Thein, Nan Sandar; Oo, Hlaing Thida (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The process of student evaluation is based on a procedure where we assume that the student belongs just to one set in a completely specified way, for example the set of excellent students, or the set of regular students. ...
  • Zaw, Thiha; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A fuzzy decision system for air helping air-traffic experts in controlling aircraft velocities and in keeping an aircraft flight within several constraints established of air lane section. Automatic systems for air-traffic ...
  • Win, Than Htun; Hnin, Mya Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents an algorithm which extends the fuzzy k-means algorithm for clustering categorical objects. In this algorithm, use a simple matching dissimilarity measure to deal with categorical objects and uses a ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Oo, Myat Htun; Htun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Tun, Thurein; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The propose system intends to implement the Email security system using RC5, BBS and RSA algorithms to encrypt and decrypt of messages. It also intends to analysis the symmetric key algorithm , public key algorithm , ...

Search Repository



Browse

My Account