UCSY's Research Repository

Browsing Third Local Conference on Parallel and Soft Computing by Title

Browsing Third Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Thuya, Sai Kyaw; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    As the information technology communication advances, there is a need for strong interest in the information security. Encryption is one of the alternative techniques that can be applied to any system for safeguarding ...
  • Htwe, Khin Mar; Naing, Thinn (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper is intended to implement shortest path way of transportation. To efficiently extract knowledge, Depth First Search (DFS), Breadth First Search (BFS), Uniform Cost Search (UCS) algorithms depend on the efficient ...
  • Oo, Hlaing Myo; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The data security is useful not only for strong and communication data in secret but also for ensuring that the source of the message is valid and that the message has not been altered. Cryptography was created as a ...
  • Myint, Yuzana; Swe, Ei Mon Mon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This paper describes the work done on the development of an audio classification system. Audio recordings are classified into basic audio types such as speech or music. Audio classification is processed in two parts, ...
  • Tun, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    A popular approach employed to embed imperceptible structures into digital media files in order to hinder unauthorized copying distribution is digital watermarking. Digital watermarking adds additional information into ...
  • Khaing, Aye Aye; Khaing, Daw (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Most of the electronic stores have a problem when interacting with their customer to sell the goods. They have to make a lot of conversation with customer, discussing the requirement of the customer and the availability ...
  • Kyaw, Thein Gi; Tun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Expert System is a high performance problem solving capable of simulating human expertise in domain. A case-based reasoning (CBR) is an approach that allows one to solve a new problem using or adapting a solution of ...
  • Aung, Myat Soe; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case based reasoning (CBR) is very important subfield of artificial intelligence which is growing rapidly. CBR based applications are used very commonly in many different fields. In this paper, we present classification ...
  • Wai, Phyo Min; Han, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The special advantage of CBR is that a case can be a very convenient means of capturing knowledge, especially in weak theory domain where the relationship between case and effects may not be well understood. In this purpose ...
  • Myint, Kyaw Phone; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Case-Base Reasoning (CBR) system is an artificial intelligent approach to learning and problem solving based on last experiences. The knowledge of case adaption is used to guide the retrieval process. Possible adaption ...
  • Yan, Phyo Wai; Thida, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Clustering algorithms are data attractive for the last class identification in spatial databases. This system presents the new clustering algorithm DBSCAN (Density-Based Spatial Clustering of Applications with Noise). ...
  • Maung, Tin Win; Thein, Thandar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today’s connected society requires secure information system to preserve data privacy and authentication un critical applications. This paper intends to implement secure information system for critical applications. The ...
  • Htwe, Nyo Nyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    This system is implemented to improve the clarity of audio echo speech signal. Acoustic echo cancellation (AEC) greatly enhances the audio quality of loudspeaker enclosure microphone (LEM) system. The presented ...
  • Wai, Shwe Soe; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    RC5 and RC6 block ciphers are standard cryptographic Encryption Algorithm for Digital Images. RC5 and RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images. Experiments ...
  • Aung, Kyaw Htet; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Wireless technology , by its nature , violates fundamental security principles. Wireless messages move through the free-space environment on certain spectrum allocations, it is vulnerable to security threats. Common ...
  • Htwe, Tin Maung; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Internet and network applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms ...
  • Thein, Myo Min; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today. More and more information has been transmitted over the World. The information is not only text, but also audio, image, and other multimedia Images have been widely used in our daily life. This paper presents on ...
  • Khin, KayKay Thi Wut Hmone; Oo, Lwin Lwin (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today, people use widely computer networks to communicate from one place to another. When people use computers, they will need necessary to protect the information and to thwart the hackers. So, people interconnect their ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Han, Hane Thu; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The role of cryptograph is important for data security. Many cryptographic techniques can be used to keep security of sensitive data. Information is an arm of Military as well as the security of information is it’s life. ...

Search Repository



Browse

My Account