UCSY's Research Repository

Local Conference on Parallel and Soft Computing

Local Conference on Parallel and Soft Computing

Recent Submissions

  • Oo, Myat Htun; Htun, Myat Thu Zar (ThirdLocal Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Htein, Aung Thet (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Data mining is process of pattern extraction from a large collection of datasets.Main goal of data mining is to discover the frequent itemsets(patterns).Sequential pattern mining is an important data mining problem that ...
  • Oo, Myat Htun; Htun, Myint Thu Zar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Classification is an important data mining technique which predicts the class of a given data sample.Classification allocates new object to one out of a finite set of previously defined classes pm the basis of observations ...
  • Yan, Phyo Wai; Thida, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Clustering algorithms are data attractive for the last class identification in spatial databases. This system presents the new clustering algorithm DBSCAN (Density-Based Spatial Clustering of Applications with Noise). ...
  • Thaw, Mie Mie; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Mobile Ad-hoc network is an autonomous system of mobile wireless nodes connected dynamically without any preexisting infrastructure. Since the nodes are mobile, the network topology changes rapidly and unpredictably ...
  • Min, Ei Phyo; Thein, Yadana (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper presents the development of English Handwritten character recognition system, which uses local and global features of English characters by applying the concept of feature feeding. After each character is ...
  • Yu, Thin Thin; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Security requires the integration of people, process, and technology. Strong information encryption and decryption scheme are crucially important for information technology. Nowadays, secret sharing is one popular ...
  • Lwin, Thi Tar; Thein, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Worldwide, businesses continually increase their dependence on IT systems for routine business processes. The business processes which directly rely on information systems and the supporting IT infrastructure often ...
  • Khaing, Kyaw Thet; Naing, Thinn (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, ...
  • Thein, Mi Chaw Mon; Thein, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In large scale wireless sensor networks clustering is often used for improving energy efficiency and achieving scalable performance. In the clustered environment, data gathered by the nodes is transmitted to the base ...
  • Mon, EiEi; Tun, Khin Nwe Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    We propose a methodology for clustering XML documents on the basis of their structural similarities. This research combines the methods of common XPath and K-means clustering that improve the efficiency for those XML ...
  • Myint, Ei Ei Pe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Music is the effective communication medium among people. Studying music mood can help in music understanding, music retrieval, and some other music-related applications. This paper presents a hierarchical framework ...
  • Hliang, Yi Yi; Tun, Khin Nwe Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Nowadays, XML plays an important role as a de facto standard online data exchange mechanism. In this paper, we present NFA-based filtering technique of XML document for multiple XPath queries using ontology. In our ...
  • Khin, Thet Thet; Sein, Myint Myint (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper focuses on the detection of target object from various kinds of objects and camouflaged scene. We offer to apply a target detection method that developed based on the nonlinear correlation approach. The ...
  • Lwin, Thandar; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The task of detecting duplicate records that represents the same real world object in multiple data sources, commonly known as duplicate detection and it is relevant in data cleaning and data integration applications. ...
  • Htwe, Ah Nge; Nge, Mi Mi (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Image resampling is a process which change the size of an image. It generates output image of the specified dimension with the help of the interpolation techniques. The up-sampled images are lost fine detailed information ...
  • Aung, Aye Moe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    During recent years, Distributed Hash Table (DHTs) have been extensively studied through simulation and analysis. As a fundamental problem in DHT based P2P system, lookup consistency and load balancing is important to avoid ...
  • Hlaing, Su Su; Kham, Nang Saing Moon (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Schema Matching can be efficiently done by using ontology concepts. Ontology matching is one of the well known topics of Semantic Web research. With the development and the use of a huge variety of data (e.g. DB schemas, ...
  • Shein, Khin Phyu Phyu; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    There has been a growing concern on ontology due to its ability to explicitly describe data semantics in a common way, independently of data source characteristics, providing a schema that allows data interchanging among ...
  • Myint, Aye Sandar; Khine, May Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    XML document are frequently used in application such as business transaction and medical record involving sensitive information. Typically, parts of xml documents should be visible to users depending on their roles. ...

View more