UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Win, Ei Shwe Sin; Mon, Myat Thida (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In this paper to protect copyright, ownership and content integrity of digital media including digital watermarking techniques. The primary motivation of this article is to study the principles of cryptographic primitives ...
  • Thu, May Phyo; Htike, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has ...
  • Win, Htwe Pa Pa; Tun, Khin Nwe Ni (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image enhancement processing step is the basic crucial part of the OCR system as the recognition accuracy of OCR systems greatly depends on the quality of the input text image. Most of the OCR systems, especially Myanmar ...
  • Aye, Saw Mya; Naing, Thinn (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Voice over Internet Protocol (VoIP) is one of the quickest developing Internet services and steadily replaces traditional telephony. VoIP application provides a means of transmitting voice communication over an IP based ...
  • Mon, Khaing Zar; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The rapid growth of on-line information has created a surge of interest in tools that are able to extract information from on-line documents. Information extraction (IE) is the process of pulling desired pieces of ...
  • Mon, Aye Nyein; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Distributed System is a collection of independent computers that appears to its users as a single coherent system. Distributed processing has become more and more important and attractive with progress in the areas of ...
  • Mu, Aye Myat; Nyunt, Thi Thi Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A Decision Support System(DSS) is an interactive computer based system or subsystem intended to help decision makers use communications technologies, data, documents, knowledge and/or model to identify and solve problems, ...
  • Aung, Thet Htet; Nwe, Khine Moe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Decision Support System (DSS) provides information, models, and data manipulation tools to help make decisions in semi-structured and unstructured situations where no one knows exactly how the decision should be made. ...
  • Kyi, Khin Myo; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Security of exchanging private information over a non secure channel is important in communications system. Efficient cryptographic techniques are necessary to endow the security level in mail system. Email security is ...
  • Aung, Ywel Nandi; Chan, Khin Ei Ei (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper implements an efficient hybrid encryption that combines symmetric key encryption, one time pad (OTP) and asymmetric key encryption, Elliptic Curve Cryptography (ECC). Elliptic Curve Key Establishment Protocol ...
  • Khine, Nila Eingyin; Hole, Gilmour (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The Organisations are implementing Executive Information Systems (EISs) to handle increasing amounts of money which are being invested. Because they need to use an effective EIS in order to achieve competitive advantage ...
  • Ye, Yamin Shwe; Soe, Khin Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The rapid growth of web generated on the internet by millions of users poses many challenges for general purpose search engines (for example, scaling).Typically a general purpose search engine consists of three main ...
  • Khaing, Mya Thet; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system ...
  • Moe, Zar Zar; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Distributed processing has more and more important and attractive with progress in the areas of computer network and distributed system. Database management system typically allows many transactions to access the same ...
  • Myint, Ohn Mar; Hlaing, Swe Zin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Web-based tutoring systems are increasingly popular due to their appeal over traditional paperbased textbooks. Whereas many tutoring systems are static HTML, the Bayesian intelligent tutoring system can help a student ...
  • Oo, Khin Lay Nwe; Yuzana (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is seen as an increasingly important tool by modern business to transform data into an informational advantage. Data mining could also be described as trying to create a simplified model of the complex world ...
  • San, Shwe Mi; Nyunt, Kyi Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Distributed Database Management System (DDBMS) is a software system that permits the management of the distributed database and makes the distribution transparent to users. DDBMS consists of a single logical database ...
  • Myat, Nway Htet; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital ...
  • Aye, Mya Myintzu; Kham, Nan Si (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Software design patterns describe solutions to specific software design problems. The usefulness of design patterns is simple to write down and catalogue common interactions between objects that programmer have frequently ...
  • Htun, Nay Thazin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In vehicle driving, speed control is vital because of whether fast or slow driving may be collision, accidences, delay and jam the traffic. These types of cases can be reduced or eliminated from the driving by using ...

Search Repository



Browse

My Account