UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Browsing Fifth Local Conference on Parallel and Soft Computing by Title

Sort by: Order: Results:

  • Lwin, Moet Moet; Htoon, Ei Chaw (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Extensible Mark-up Language (XML) is increasingly important in data exchange and information management. The automatic processing and management of XML-based data are ever more popular research issues due to the ...
  • Kyaing, Htwe Htwe; Nge, Mi Mi (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Keyword-based image retrieval systems have become popular for many image database applications. To improve the performance of keyword-based web image queries, combination of keyword and visual feature based image ...
  • Aye, Thi Dar; Soe, Khin Mar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Association rule mining is a technique to find useful patterns and associations in transactional databases. The mining of association rules can be mapped into the problem of discovering large (frequent) itemsets where ...
  • Win, May Thuzar; Sandar, Khin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    There are several ways that noise can be introduced into an image, depending on how the image is created. Today, there are varieties of image noise reduction techniques. Several approaches have been introduced each has its ...
  • Soe, Hay Mar; Kham, Nang Saing Moon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Association Rules is the process of identifying relationships among set of items in transaction database. Finding frequent itemsets is the most expensive step in Association rule discovery. Real world datasets are ...
  • Myo, Khin Yupar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Scalability of symmetric cipher is still not as natural as for public-key cryptosystems. Most of the current block ciphers do not support freely variable block and key lengths. A generalization of the concepts of Feistel ...
  • Hmon, Moh Moh Wut; Htway, Thin Thin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This system deals with the problem of finding shortest paths in traversing some location within Myanmar. In particular, it explores the use of three approaches, Dijkstra’s shortest path algorithm, Bellman-Ford shortest ...
  • Cho, War War; Nwe, Nwe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Frequent pattern mining is one of the active research themes in data mining. It is an important role in all data mining tasks such as clustering, classification, prediction and association analysis. Frequent pattern is the ...
  • Thu, Mi Swe Zar; Mar, Soe Hay (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Computer base methods are increasingly used to improve the quality of medical services. Expert system uses knowledge, facts and reasoning techniques to solve problems that normally require the expertise, experiences and ...
  • Phyu, Aye Pwint; Nyein, May Kyi (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    A database is a structured collection of data items that can be accessed concurrently by several transactions. The concurrency control in distributed databases is an important problem. This paper is intended to build ...
  • Myint, Khin Sandar; Htoon, Ei Chaw (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Commuting operations greatly simplify consistency in distributed systems. A Commutative Replicated Data Type (CRDT) is one where all concurrent operations commute. The replicas of a CRDT converge automatically without ...
  • Yee, Thiri The` Wut (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The revolution of mobile phones era has brought the innovative smartphones technology. As a result, research addressing information access in smartphones environment has proliferated. The important feature in security ...
  • Moe, Khin Wai; Thein, Naychi Lai Lai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper describes the mobile agent-based music selection that generates dynamic playlist based on suggestions from multiple users and presents the design and development of music selection service which is implemented ...
  • Soe, Aye Aye; Phyu, Sabai (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes ...
  • Aung, Myat Thu; Cho, Aung (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data mining is the task of discovering interesting patterns from large amounts of data. These data can be stored in database. Data classification in data mining tasks is the process of building a model from available data ...
  • Zaw, Sai Maung Maung (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    This paper is presented as hybrid protocol for MAC layer in Wireless Sensor Networks (WSNs). It combines contention and schedule-based methods. Time slots are assigned at deployment and reassigned when significant ...
  • Latt, Kyaw Zin; Ko, Lin Min (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication ...
  • Win, Phyoe Su Su; Mon, Thet Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The general elements of transaction processing are data capture and validation, transaction-dependent processing steps and database maintenance. Database Management Systems (DBMS) are among the most complicated applications. ...
  • Hlaing, Htike Ayar; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the current computing community, secure data transfer is limited due to its attack made on data communication. Solutions which came to the rescue are cryptography and steganography. Cryptography is often used in ...
  • Win, Swe Zin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Today, many business applications continue the ongoing creation of separated data stores; data mining often requires data integration for those data. This process becomes significant in a variety of situations both ...

Search Repository



Browse

My Account