UCSY's Research Repository

Browsing Fourth Local Conference on Parallel and Soft Computing by Issue Date

Browsing Fourth Local Conference on Parallel and Soft Computing by Issue Date

Sort by: Order: Results:

  • Oo, Hay Man; Thwin, Khin Lay (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper can describe a similarity-based retrieval framework that addresses the challenges associated with the relational database text documents. This system proposes to automatically classify documents based on the ...
  • Thant, Wut Yee; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this paper, we propose a support vector machines (SVMs) method of classifying image regions hierarchically based on their semantics rather than on low-level features. First, image regions are segmented using the ...
  • Khaing, Ngwe Zin; Sandar, Khin; Oo, May Phyo (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Data mining in an area in the intersection of machine learning statistics, and database is to use searching for relationships and global pattern that exits, but is hidden in large database. The discovery of interesting ...
  • Win, Kyaw San; Kyu, Khin Kyu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. ...
  • War, Hnin Hnin; Kyi, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Portals present information from diverse source in a unified way. These offer a way for enterprise to provide a consistent look and feel with access control and procedures for multiple applications. This paper proposes a ...
  • Aye, Thin Thin; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper proposes two types of artificial neural networks to classify the Buddhist iconographies in order to compare the performances of two networks; multilayer feed forward network and Hopfield network. The quality of ...
  • Oo, Saw Lay Naing (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Tuberculosis (TB) is a contagious and potentially fatal disease that can affect almost any part of the body but manifests mainly as an infection of the lungs. It is caused by a bacterial microorganism, the tubercle ...
  • Moe, Khaing Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In our research we use classification using decision tree approach. The Decision Tree is one of the most popular classification algorithms in current use in Data Mining and Machine Learning. According to our experiment ...
  • Oo, Thaw Thaw (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Querying in Natural language is more convenient for the user than querying in SQL. This paper is intended to construct the query translation system from Natural Language to SQL. Natural Language Processing is a theoretically ...
  • War, Nu (2009-12-30)
    At the core of the presented system is a highly robust fingerprint extraction method which enables searching a large fingerprint database with only limited computing resources. Requirements for such systems include ...
  • San, Swe Swe; Tin, Tun (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The purpose of this system is to develop a decision support system that can support the decision making to people who has to deal with essential information for visiting places. The main objective of this system is to ...
  • Thant, Yin Mon; Lwin, Su Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, a website is much more than just a beautiful graphic design on screen; it is an important tool to provide the necessary information to the visitors. The management of web content and information plays an importance ...
  • Oo, Aung Nway (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Proxy blind signature, which combines the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original ...
  • Lin, K Zin (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The explanation of how a decision made is important for accepting the machine learning technology, especially for applications such as multimedia. SVMs have shown strong generalization ability in a number of application ...
  • Hlaing, Hnin Ei Ei; Khine, May Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Mining frequent patterns is an important component of many prediction systems. One common usage in web applications is the mining of users’ access behavior for the purpose of predicting and hence pre-fetching the web pages ...
  • Mon, Aye Aye; Mar, Khin Thet (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today’s connected society requires secure information system to preserve data privacy and authentication in critical applications. This paper intends to implement secure web development system for critical applications. ...
  • Yu, Thin Thin; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Security requires the integration of people, process, and technology. Strong information encryption and decryption scheme are crucially important for information technology. Nowadays, secret sharing is one popular ...
  • Lwin, Yupar Kyaw; Thida, Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A data warehouse uses multiple materialized views to efficiently process a given set of queries. Materialized views selection is one of the crucial decisions in designing a data warehouse for optimal efficiency. The idea ...
  • Phyo, Nang Wai Wai; Hlaing, Chit Su (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents a method to normalize logical propositions in numerical data. Type of min_max normalization is emphasized in this study. Data mining is concerned with analyzing large volume of data to automatically ...
  • Hlaing, Sandi Su; Htoon, Ei Chaw (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Distributed Command Pattern is a proposed pattern for solving the extra architectural design issues which need to be considered for connected systems than designing regular applications. The goal of this pattern is to ...

Search Repository



Browse

My Account