UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Title

Browsing Third Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Htun, Sai Zaw Moe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper studies the Minimum Spanning Tree Methods. A graph is a collection of nodes and edges, but has no rules dictating the connection among the nodes. All trees are graphs. A tree is a special case of graph in ...
  • Thein, Nan Sandar; Oo, Hlaing Thida (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The process of student evaluation is based on a procedure where we assume that the student belongs just to one set in a completely specified way, for example the set of excellent students, or the set of regular students. ...
  • Zaw, Thiha; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A fuzzy decision system for air helping air-traffic experts in controlling aircraft velocities and in keeping an aircraft flight within several constraints established of air lane section. Automatic systems for air-traffic ...
  • Win, Than Htun; Hnin, Mya Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents an algorithm which extends the fuzzy k-means algorithm for clustering categorical objects. In this algorithm, use a simple matching dissimilarity measure to deal with categorical objects and uses a ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Oo, Myat Htun; Htun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Tun, Thurein; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The propose system intends to implement the Email security system using RC5, BBS and RSA algorithms to encrypt and decrypt of messages. It also intends to analysis the symmetric key algorithm , public key algorithm , ...
  • Zeya, Kyaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The fire service mission is to assist the public in the protection of life and properties by minimizing the impact of fire, medical emergencies, and potential disasters or events that affect communities and the envir ...
  • Aye, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is an important field of study for most day-to-day transactions. Cryptography standards are needed to create interoperability in the transformation security world. Cryptography mechanism is based on ...
  • Aung, Pyae Phyo; Soe, Khin Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system develops an intelligent search mechanism among large amount of distributed data on a Peerto- Peer network. To illustrate the intelligent search mechanism, the system builds a decentralized newspaper application. ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Aung, Htin Lin; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Internet and network applications are growing very fast, so critical information is needed to protect . Crypto algorithms play a main role in information security systems. In this paper, we present secure data ...
  • Thura, Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Two secure end users want to communicate over an insecure channel. The enemy user is an outsider, listening to attack the communication. Encryption is the converting readable information as “plain text” into ...
  • Ko, Naing Linn Ko; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The growth of the Internet and e-commerce has presented businesses; these have also been exposed to the various threats. So, network security is necessary to counter the threats and make networks safe to use. The main ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Aung, Htike Htet; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Graphs have been used in a wide variety of application. Some of these applications are analysis of electrical circuits, finding shortest routes, project planning, and identification of chemical compounds, statistical ...
  • Thein, Si Thu Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is very important role for information and data. Data communication is the most important in the world. Communication technology is increased as well as an authorized person can intercept the security ...

Search Repository



Browse

My Account