UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Issue Date

Browsing Third Local Conference on Parallel and Soft Computing by Issue Date

Sort by: Order: Results:

  • Wai, Phyo Min; Han, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The special advantage of CBR is that a case can be a very convenient means of capturing knowledge, especially in weak theory domain where the relationship between case and effects may not be well understood. In this purpose ...
  • Han, Wai Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The presence of background noise in recorded speech reduces the quality of speech. It can also degrade the performance of other systems, such as speech compression, speech recognition, and speaker authentication. The ...
  • Kyaw, Wai Phyo; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In distributed Authentication between clients and servers using public key cryptography approach, both client and server do not need to maintain keys with Key Distribution Center (KDC). Maintaining keys at the server ...
  • Ko, Naing Linn Ko; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The growth of the Internet and e-commerce has presented businesses; these have also been exposed to the various threats. So, network security is necessary to counter the threats and make networks safe to use. The main ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Moe, Kay Khaing; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A microcontroller based electronic circuit designed and constructed to do arithmetic logic unit (ALU) operation. Sixteen switches are used as inputs by using LED indicators. The output results are displayed with 8 LED ...
  • Oo, Myat Htun; Htun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Htwe, Tin Maung; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Internet and network applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms ...
  • Aye, Htein Linn; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, online processing is increasing day by day and security plays important role in online processing , especially in the area of government processes. There are several security algorithms already presented. Among ...
  • Yar, Thar; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Artificial Intelligence (AI) is the computational part of the ability to achieve goal. A search algorithm, broadly speaking is an algorithm that takes a problem as input and returns a solution to the problem, usually ...
  • Myint, Kyaw Phone; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-Base Reasoning (CBR) system is an artificial intelligent approach to learning and problem solving based on last experiences. The knowledge of case adaption is used to guide the retrieval process. Possible adaption ...
  • InZaLi, Htar; Kham, Nan Si (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Travels and tourism service is developing and very popular around the world and information technology is having a big effect on all sectors of tourism. Tourists have problems to find what they are looking for, especially ...
  • Win, May Thu; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, the security of the information exchanged is very important. In this paper, MD5 is used for computing the hash value of the message and RSA is used for signing the message and verifying the digital signature. ...
  • Yan, Phyo Wai; Thida, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Clustering algorithms are data attractive for the last class identification in spatial databases. This system presents the new clustering algorithm DBSCAN (Density-Based Spatial Clustering of Applications with Noise). ...
  • Min, Zay Yar; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the technology grows rapidly, many people take a great interest in computer and then computerbased methods are increasingly used to improve the quality of the medical services. Human experts in medical field ...
  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Thein, Myo Min; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today. More and more information has been transmitted over the World. The information is not only text, but also audio, image, and other multimedia Images have been widely used in our daily life. This paper presents on ...
  • Thuya, Sai Kyaw; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the information technology communication advances, there is a need for strong interest in the information security. Encryption is one of the alternative techniques that can be applied to any system for safeguarding ...
  • Aung, Myat Soe; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case based reasoning (CBR) is very important subfield of artificial intelligence which is growing rapidly. CBR based applications are used very commonly in many different fields. In this paper, we present classification ...

Search Repository



Browse

My Account