UCSY's Research Repository

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Browsing Fourth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Oo, Naing Lin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Myanmar spelling checker system is the important task in one of NLP application such as information retrieval and in most other NLP applications. This system is based on N-Gram approach for Myanmar Spelling Checker. The ...
  • Sue, Khin Mo; Kyi, Tin Mar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The main aim of this paper is to develop a system for classifying the soil class of Myanmar by the help of Error Back-propagation algorithm (EBP) which is the most widely used algorithm among Artificial Neural Network (ANN ...
  • Hliang, Yi Yi; Tun, Khin Nwe Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, XML plays an important role as a de facto standard online data exchange mechanism. In this paper, we present NFA-based filtering technique of XML document for multiple XPath queries using ontology. In our ...
  • Ou, Shein Phyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents multi-agent system and forwards-chaining algorithm. This system intends to support the internet users who are interested in searching for the job from online processing. It hunts job depending the user’s ...
  • Aye, The` Seint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    As Agents become more active and sophisticated, their implicit actions become more serious. This paper describes the use of software agents for extracting data and reserving ticket to improve the services. These agents can ...
  • Khine, Win Lei Kay; Khine, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Electronic Commerce (E-commerce) has become one of the essential characteristics in the Internet era. Nowadays, E-commerce is growing rapidly in the Internet, and has become a complement to the usual business activities ...
  • Lwin, Nu Nu; Latt, Yin Ko (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The organizational systems are replaced with the computer networking system all over the worl d. File systems are responsible for the organization, storage, retrieval, naming, sharing and protection of files. The system ...
  • Aye, Yin Mon Nyein (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Increasing number of online auctions is challenging to those who are looking for good deals. Agent technology can be applied to E-commerce today in order to help users in buying things. Online auctions and negotiations ...
  • Oo, Kyaw Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, Information Technology (IT) is rapidly improving and then large-scale available data and information is demanded by information society. To get relevant and related information, efficient Information Retrieval (IR) ...
  • Cho, Hnin Ei Ei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Retrieving the necessary information about the domain provide the user to acquire the explicit knowledge for that domain. This information about terms and their relations is traditionally provided through dictionaries. But ...
  • Khaing, Khin Kyawt Kyawt; Hlaing, Moe Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays,Information Technology is rapidly improving to provide possibilities for integration among applications using various databases. It involves retrieving and integrating information from multiple data sources. The ...
  • Cho, Ei Mon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Geographic Information System (GIS) is a computer system capable of capturing, analyzing, and displaying geographically referenced information; that is, data identified according to location. Geospatial information system ...
  • Mar, Aye Aye; Aung, Nang Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Dijkstra algorithm among the shortest-path algorithms is to solve the shortest-path problem. Dijkstra’s algorithm is probably the best-known and thus most implemented shortest path algorithm. It is based on a priority queue ...
  • Phyu, Nan Khaing Pwint; Aung, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Outlier analysis is that the user do depends on the kinds data they have. An outlier is a data value, that has a very low probability of occurrence that is, it is unusual. There are three kinds of outlier detection in ...
  • Hlaing, Wint Wah; Khin, Tar Tar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Outlier detection is an important task in data mining activities and has much attention in both research and application. A value that lies outside which is much smaller or larger than most of the other value in a set of ...
  • Htwe, Ei Ei (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Clustering is the process of grouping a set of objects into classes or clusters so that objects within a cluster have similarity in comparison to one another, but are dissimilar to objects in other clusters. Clustering ...
  • Nyunt, Han Su Yin; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Local sequence alignment is widely used to discover structural and hence, functional similarities between biological sequences. Sequence database alignment is among the most important and challenging tasks in bioinformatics. ...
  • Aung, Thet Sandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents the way to calculate waiting times of patients. Results of patient surveys generally cite access to care and delays in care as sources of dissatisfaction. Delays are expensive, not only in terms of ...
  • Kyaw, May Phyu; Yuzana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such modifies have to express organization specific security ...
  • Win, Kyaw San; Kyu, Khin Kyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. ...

Search Repository



Browse

My Account