UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • San, Shwe Mi; Nyunt, Kyi Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Distributed Database Management System (DDBMS) is a software system that permits the management of the distributed database and makes the distribution transparent to users. DDBMS consists of a single logical database ...
  • Myat, Nway Htet; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital ...
  • Aye, Mya Myintzu; Kham, Nan Si (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Software design patterns describe solutions to specific software design problems. The usefulness of design patterns is simple to write down and catalogue common interactions between objects that programmer have frequently ...
  • Htun, Nay Thazin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In vehicle driving, speed control is vital because of whether fast or slow driving may be collision, accidences, delay and jam the traffic. These types of cases can be reduced or eliminated from the driving by using ...
  • Tun, Ei Ni Tar; Htay, Sandar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Digital image processing is the use of computer algorithms to perform image processing on digital images. Image Processing can be used in many application contexts such as Motion Detection, Feature extraction, Pattern ...
  • Than, Myint Myint; Soe, Yee Yee (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Multi signature schemes provide data authenticity integrity, and non repudiation. The proposed signing and verifying schemes are extensions of standardized algorithms ECDSA (Elliptic Curve Digital Signature Algorithm). These ...
  • Maung, Moh Cherry; Tun, Myat Thuzar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, the field of advertising is more spread. Broadcasting media receives advertisements from advertisement companies. When programme are shown, these advertisements used to be broadcasted. Most of the advertisement ...
  • Soe, Htet Htet (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The rapid growth of technology has largely eased the access to information. At the same time, it is increasingly difficult for human people to collect, filter, evaluate and really use the vast amount of information. ...
  • Yi, Htwe Htwe; Nwe, Nwe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This system is designed to help the users for retrieving the product and price information of the competitors’ website and monitor updated information in the competitors’ website for the most frequently interested product ...
  • Thwe, Phyu Hnin; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    RSS (Really Simple Syndication) is a technology that is being used by millions of web users around the world to keep track of their favourite websites. By using RSS, we can stay on top of the news and information without ...
  • Aung, Thuzar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A distributed database is not stored in its entirety at a single physical location. Instead, it is spread across a network of computers that are geographically dispersed and connected via communications links. A ...
  • Win, Cherry Kyaw; Zar, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, Internet and network applications are growing very fast. Thus, people need to protect the information and to thwart the hackers. People interconnect their secret data by using cryptographic algorithms. But, the ...
  • Zaw, Lai War; Aye, Nilar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Computer have become an indispensable tool in the Health Care Industry. As technology grows rapidly many people take great interest in computer and then computer based method are used to improve the quality of the ...
  • Naing, Moe Ka Lhyar; Khin, Myo Myo (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Time Scheduling System represents a subclass of scheduling problems that are hard to solve. Genetic Algorithm (GA) has emerged as a useful tool for the scheduling and timetabling problem. This paper is concerned with the ...
  • Zin, Thet Thet (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Machine Translation is defined as the task of transforming an existing text written in a source language, into an equivalent text in a different language, the target language. The statistical machine translation approach ...
  • Zin, Thet Thet (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Machine Translation is defined as the task of transforming an existing text written in a source language, into an equivalent text in a different language, the target language. The statistical machine translation approach ...
  • Mhon, Gant Gaw Wutt; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Web usage mining is the discovery of user access patterns from Web usage logs. The paper presents two XML (Extensible Markup Language) 1.0 applications and a web data mining application which utilizes it to extract web ...
  • Khaing, Ei Ei; Soe, Khin Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Statistical word alignment models have been widely used for various Natural Language Processing (NLP) problem. In statistical machine translation, word alignment models are trained on bilingual corpora. To build an SMT ...
  • Aung, Zay; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In traditional association rule mining that based on Apriori-like algorithm, all frequent itemsets are computed and strong association rules are then generated from the set of all frequent itemsets as a next step. By ...
  • Mon, Su Su; Oo, Khine Khine (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A distributed database is a database with its data elements stored at several sites of a computer network. Certain data items may be redundantly stored at more than one site for reliability reasons. A replicated database ...

Search Repository



Browse

My Account