UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Title

Browsing Third Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Aye, Htein Linn; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, online processing is increasing day by day and security plays important role in online processing , especially in the area of government processes. There are several security algorithms already presented. Among ...
  • Kyi, Ye Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence is defined generally as the attempt to construct mechanisms that performed by humans. The knowledge base contains knowledge necessary for understanding, formulating, and solving problems. This ...
  • Aung, Yin Pa Pa; Htoo, Nay Zar Chi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptography makes secure websites and electronic safe transmission possible. For a web site to be secure all of the data transmitted between the computers where the data is kept and where it is received must be encrypted. ...
  • Latt, Tin Mg (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents a method for detection of ECG QRS complexes using signal energy. This system reliably recognizes QRS complexes based upon digital analyses of slope, amplitude, and width. In order to reduce false ...
  • Oo, San Naing; Tun, Myat Thuzar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Traditionally, the routing problem has been a single objective problem having as goal the minimization of either the total distance or travel time. Many approached and strategies are used for an appropriate solution to ...
  • Hein, Nay Zaw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Combinatorial reasoning underlines all analysis of computer systems. It plays a similar role in discrete operational research problems. Two of the most basic mathematical aspects of computer science concern the speed ...
  • Moe, Hlwan (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure exchange of secret messages over public channel plays a very important role of secret communication. The use of Steganography is much less threatening than the use of cryptography because after encoding stego ...
  • Than, Myo Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In computer and network systems, the private access systems use cryptosystems that provide to certain and ensure data of information that are authentic and secure. This paper will develop the secure bank transaction ...
  • Aung, Theingi Nwe; Hlaing, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    With the rapid advances in security threads, more reliable security techniques have become the business necessity. The security services must assure that the communication is not refered with in such a way that the party ...
  • Htet, Lwin; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There ...
  • Htet, Yi Mon; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Encryption is used to securely transmit data in open networks. It can also be defined as the process of obscuring information to make it unreasonable without special knowledge. Encryption is the process of transformation ...
  • Win, Kyaw Thura; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure communication in physically vulnerable networks depends upon encryption of material passed between machines. It is feasible for each computer in the network to encrypt and decrypt material efficiently with arbitrary ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Nyein, Khin Thara Phyu; Thein, Nilar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Telegraphy message security system relies on the privacy and authentication of information, which requires implementation of cryptographic functions, and measures are needed to protect data during their transmission. A ...
  • Soe, Naing Thura; Thant, Khin Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Dijkstra’s Algorithm solves the problem of finding the shortest path from a point (the source) to a destination. This problem is sometimes called the single-source shortest path problem. In these days, the world become ...
  • Tun, Nyan Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Information and access to information is important in modern society. Network security is necessary to counter the threats and make network safe to use. There are some methods to prevent eavesdropping or falsification ...
  • Htein, Aung Thet (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Data mining is process of pattern extraction from a large collection of datasets.Main goal of data mining is to discover the frequent itemsets(patterns).Sequential pattern mining is an important data mining problem that ...
  • Lwin, Pyae Phyo; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Intelligent control of home appliances has attracted much theoretical attention, as well as becoming a major factor for industrial and economic success and rapid market penetration. A fuzzy control that uses rules based ...
  • Myint, Kyaw Myo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper presents a methodology for speech or music classification over broadcast digital audio signals. In feature extraction, only a single feature named spectral entropy is employed. The spectral features of recorded ...
  • Swe, Kyaw Ei Ei; Aung, Sint Sint (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cluster is refers to identifying the number of subclasses of c-clusters (2d” cd” n). There are two kinds of c partition of data: hard (or crisp) and soft (or fuzzy) . Two important issues are to consider how to measure ...

Search Repository



Browse

My Account