UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Title

Browsing Third Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Han, Wai Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The presence of background noise in recorded speech reduces the quality of speech. It can also degrade the performance of other systems, such as speech compression, speech recognition, and speaker authentication. The ...
  • Aung, Ei Mon Mon; Min, Mar Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Voice Activity Detection (VAD) is used to detect the presence of speech in an audio signal. VAD plays an important role as a preprocessing stage in numerous audio processing applications. In Voice over IP (VoIP) and ...
  • Yar, Thar; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence (AI) is the computational part of the ability to achieve goal. A search algorithm, broadly speaking is an algorithm that takes a problem as input and returns a solution to the problem, usually ...
  • Htun, Sai Zaw Moe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper studies the Minimum Spanning Tree Methods. A graph is a collection of nodes and edges, but has no rules dictating the connection among the nodes. All trees are graphs. A tree is a special case of graph in ...
  • Thein, Nan Sandar; Oo, Hlaing Thida (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The process of student evaluation is based on a procedure where we assume that the student belongs just to one set in a completely specified way, for example the set of excellent students, or the set of regular students. ...
  • Zaw, Thiha; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A fuzzy decision system for air helping air-traffic experts in controlling aircraft velocities and in keeping an aircraft flight within several constraints established of air lane section. Automatic systems for air-traffic ...
  • Win, Than Htun; Hnin, Mya Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents an algorithm which extends the fuzzy k-means algorithm for clustering categorical objects. In this algorithm, use a simple matching dissimilarity measure to deal with categorical objects and uses a ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Oo, Myat Htun; Htun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Tun, Thurein; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The propose system intends to implement the Email security system using RC5, BBS and RSA algorithms to encrypt and decrypt of messages. It also intends to analysis the symmetric key algorithm , public key algorithm , ...
  • Zeya, Kyaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The fire service mission is to assist the public in the protection of life and properties by minimizing the impact of fire, medical emergencies, and potential disasters or events that affect communities and the envir ...
  • Aye, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is an important field of study for most day-to-day transactions. Cryptography standards are needed to create interoperability in the transformation security world. Cryptography mechanism is based on ...
  • Aung, Pyae Phyo; Soe, Khin Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system develops an intelligent search mechanism among large amount of distributed data on a Peerto- Peer network. To illustrate the intelligent search mechanism, the system builds a decentralized newspaper application. ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Aung, Htin Lin; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Internet and network applications are growing very fast, so critical information is needed to protect . Crypto algorithms play a main role in information security systems. In this paper, we present secure data ...

Search Repository



Browse

My Account