UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Title

Browsing Third Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Oo, Myat Htun; Htun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Tun, Thurein; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The propose system intends to implement the Email security system using RC5, BBS and RSA algorithms to encrypt and decrypt of messages. It also intends to analysis the symmetric key algorithm , public key algorithm , ...
  • Zeya, Kyaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The fire service mission is to assist the public in the protection of life and properties by minimizing the impact of fire, medical emergencies, and potential disasters or events that affect communities and the envir ...
  • Aye, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is an important field of study for most day-to-day transactions. Cryptography standards are needed to create interoperability in the transformation security world. Cryptography mechanism is based on ...
  • Aung, Pyae Phyo; Soe, Khin Mar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system develops an intelligent search mechanism among large amount of distributed data on a Peerto- Peer network. To illustrate the intelligent search mechanism, the system builds a decentralized newspaper application. ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Aung, Htin Lin; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Internet and network applications are growing very fast, so critical information is needed to protect . Crypto algorithms play a main role in information security systems. In this paper, we present secure data ...
  • Thura, Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Two secure end users want to communicate over an insecure channel. The enemy user is an outsider, listening to attack the communication. Encryption is the converting readable information as “plain text” into ...
  • Ko, Naing Linn Ko; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The growth of the Internet and e-commerce has presented businesses; these have also been exposed to the various threats. So, network security is necessary to counter the threats and make networks safe to use. The main ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Aung, Htike Htet; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Graphs have been used in a wide variety of application. Some of these applications are analysis of electrical circuits, finding shortest routes, project planning, and identification of chemical compounds, statistical ...
  • Thein, Si Thu Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is very important role for information and data. Data communication is the most important in the world. Communication technology is increased as well as an authorized person can intercept the security ...
  • InZaLi, Htar; Kham, Nan Si (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Travels and tourism service is developing and very popular around the world and information technology is having a big effect on all sectors of tourism. Tourists have problems to find what they are looking for, especially ...
  • Oo, Thane Sat; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The World Wide Web has grown from a few thousand pages to billion of pages at present. Due to this explosion in size, web search systems are becoming increasingly important as the primary means of locating relevant ...
  • Kyi, Linn Htaik; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In the rapid improvement of communication environment, it is desirable to improve the security measure on the use of between the sender and receiver. Cryptography is an important aspect of communications security and ...
  • Aye, Htein Linn; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, online processing is increasing day by day and security plays important role in online processing , especially in the area of government processes. There are several security algorithms already presented. Among ...

Search Repository



Browse

My Account