2011 6th International Conference on Industrial and Information Systems最新文献

筛选
英文 中文
An empirical study on slow and limited adoption of Internet Banking by Sri Lankan customers 斯里兰卡客户采用网上银行缓慢而有限的实证研究
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-10-10 DOI: 10.1109/ICIINFS.2011.6038102
S. Weerasekara, P. Abeygunawardhana
{"title":"An empirical study on slow and limited adoption of Internet Banking by Sri Lankan customers","authors":"S. Weerasekara, P. Abeygunawardhana","doi":"10.1109/ICIINFS.2011.6038102","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038102","url":null,"abstract":"Usage of internet is rapidly increasing in Sri Lanka. However, usage of internet banking is very slow compared to increase of internet users. This study will focus on four main possible areas which may effect to slow adaptation of Internet Banking as Awareness & Knowledge of Internet Banking, Perceived Characteristics of Internet Banking, Consumer Resistance to Change, Legal Support and IS Security. Based on the data gathered, these 4 conditions are tested using statically analysis method.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123198577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling of power transmission lines for lightning back flashover analysis (A case study: 220kV Biyagama-Kotmale transmission line) 输电线路雷电反闪络分析建模(以220kV Biyagama-Kotmale输电线路为例)
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-10-10 DOI: 10.1109/ICIINFS.2011.6038099
M. Chanaka, K. Shanthi, R. Perera
{"title":"Modeling of power transmission lines for lightning back flashover analysis (A case study: 220kV Biyagama-Kotmale transmission line)","authors":"M. Chanaka, K. Shanthi, R. Perera","doi":"10.1109/ICIINFS.2011.6038099","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038099","url":null,"abstract":"Performance of power transmission lines has a great impact on reliability of a particular power supply system of a country. Unreliable power transmission lines can even lead to total power failures resulting with great financial losses. The lightning back flashover effects are recognized as one of the major causes of transmission line outages, especially in tropical countries with frequent lightning. Several types of solutions are presently available to address the issue of lightning back flashovers. However, the modern concept of transmission line mounted surge arresters is of great popularity due to its excellent performance, ease of installation and the low cost compared to the other solutions. This paper describes a case study carried out on one of the critical hill-country 220kV power transmission lines of the Sri Lankan transmission network, having several past records of lightning back flashover related outages leading to total system failures. The study described in this paper mainly focuses on the way of analyzing the back flashover events by transient modeling and subsequent simulation of the selected transmission line in an electromagnetic transient computer program. The study uses the Power System CAD (PSCAD) software program as the software tool for the purpose of modeling and simulation. Simulations are carried out with and without Transmission Line Arrester (TLA) to evaluate TLA's impact on back flashover. The results of the simulations show that the installation of 02nos. of TLA at top phases of each selected towers improve the overall performance.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132482587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Performance analysis for classification in balanced and unbalanced data set 平衡与非平衡数据集的分类性能分析
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-10-10 DOI: 10.1109/ICIINFS.2011.6038084
S. Padma, S. Kumar, R. Manavalan
{"title":"Performance analysis for classification in balanced and unbalanced data set","authors":"S. Padma, S. Kumar, R. Manavalan","doi":"10.1109/ICIINFS.2011.6038084","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038084","url":null,"abstract":"This paper focuses on performance evaluation of the classification algorithms for problems of unbalanced and balanced large data sets. Three methods such as ELM, MRAN, and SRAN have been proposed for solving the set classification problem and studied. The ELM is based on randomly chosen hidden nodes and analytically determines the output weights of SLFNs. Then the next method M-RAN is a sequential learning radial basis function neural network which combines the growth criterion of the resource allocating network (RAN) of Platt with a pruning strategy based on the relative contribution of each hidden unit to the overall network output. The last method SRAN uses of misclassification information and hinge loss error in growing/learning criterion helps in approximating the decision function accurately. The performance evaluation using balanced and imbalanced data sets shows that one of the proposed algorithms SRAN generates minimal network with higher classification performance.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Countermeasures against Bernstein's remote cache timing attack 对付伯恩斯坦远程缓存定时攻击的对策
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-10-10 DOI: 10.1109/ICIINFS.2011.6038038
Janaka Alawatugoda, Darshana Jayasinghe, R. Ragel
{"title":"Countermeasures against Bernstein's remote cache timing attack","authors":"Janaka Alawatugoda, Darshana Jayasinghe, R. Ragel","doi":"10.1109/ICIINFS.2011.6038038","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038038","url":null,"abstract":"Cache timing attack is a type of side channel attack where the leaking timing information due to the cache behaviour of a crypto system is used by an attacker to break the system. Advanced Encryption Standard (AES) was considered a secure encryption standard until 2005 when Daniel Bernstein claimed that the software implementation of AES is vulnerable to cache timing attack. Bernstein demonstrated a remote cache timing attack on a software implementation of AES. The original AES implementation can methodically be altered to prevent the cache timing attack by hiding the natural cache-timing pattern during the encryption while preserving its semantics. The alternations while preventing the attack should not make the implementation very slow. In this paper, we report outcomes of our experiments on designing and implementing a number of possible countermeasures.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of frequency reconfigurable microstrip patch antenna 频率可重构微带贴片天线的设计
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-10-10 DOI: 10.1109/ICIINFS.2011.6038033
G. Singh, Mithilesh Kumar
{"title":"Design of frequency reconfigurable microstrip patch antenna","authors":"G. Singh, Mithilesh Kumar","doi":"10.1109/ICIINFS.2011.6038033","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038033","url":null,"abstract":"Recent developments in the wireless communication industry continue to drive the requirements for small, compatible, and affordable reconfigurable antennas. To overcome the challenges of multi-frequency operation a new scheme of frequency reconfiguration is proposed. In the proposed design a rectangular patch antenna with slots at the centre frequency 10 GHz that can be reconfigured in the frequency range of 10–10.5 GHz. The reconfiguration is carried out by switching the diodes ON/OFF. The antenna is designed on FR4 substrate (εr= 4.54) of thickness (H) 1.50 mm. The proposed structure was simulated by using the electromagnetic (EM) simulation software. The simulated return loss for different configuration are less than −10dB at resonance frequencies. The simulated are very exciting and show the close agreement with proposed design.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Individual channel analysis of induction generator-based wind turbines 基于感应发电机的风力发电机的单个通道分析
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-10-10 DOI: 10.1109/ICIINFS.2011.6038080
C. E. Ugalde-Loo, J. Ekanayake
{"title":"Individual channel analysis of induction generator-based wind turbines","authors":"C. E. Ugalde-Loo, J. Ekanayake","doi":"10.1109/ICIINFS.2011.6038080","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038080","url":null,"abstract":"Wind penetration into electricity grids has been significant over the last decades. The need of comprehensive studies to identify the interactions between wind farms with the power system has been recognised. In line with this, the individual channel analysis of induction generator-based wind turbines is presented in this paper. Individual channel analysis and design (ICAD) is a frequency domain framework with the help of which the investigation of the potential and limitations for control design of multivariable systems can be assessed. Under this framework, a formal evaluation of the internal coupling inherent to variable-speed wind turbines is carried out — with the coupling being quantified in the frequency domain through ICAD's multivariable structure function (MSF). Results offer formal insight into wind turbine control strategies based on vector control. Moreover, an appropriate analysis of the MSFs shows that the use of compensation loops may not be necessary to achieve a satisfactory control system design.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Non invasive cross sectional imaging using electric capacitance tomography 使用电容断层成像的无创横断面成像
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-10-10 DOI: 10.1109/ICIINFS.2011.6038072
C. Mediwaththe, Kasun E. Wijethilake, D. B. W. Abeywardana, Sachini E. Wijethilake, J. Wijayakulasooriya, D. Uduwawala
{"title":"Non invasive cross sectional imaging using electric capacitance tomography","authors":"C. Mediwaththe, Kasun E. Wijethilake, D. B. W. Abeywardana, Sachini E. Wijethilake, J. Wijayakulasooriya, D. Uduwawala","doi":"10.1109/ICIINFS.2011.6038072","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038072","url":null,"abstract":"This paper describes an Electrical capacitance Tomography (ECT) based sensor system designed for noninvasive cross sectional imaging of an object. It uses relative capacitance measurements of 8 electrodes placed along the peripheral of the sensor system to obtain the cross sectional image. The use of Linear Back Projection Algorithm (LBPA) to estimate the cross sectional image is demonstrated. Also, it is shown that iterative reconstruction methods can be used to further improve the results.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CyberMate ∼ Artificial Intelligent business help desk assistant with instance messaging services CyberMate ~具有实例消息服务的人工智能业务帮助台助理
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-08-16 DOI: 10.1109/ICIINFS.2011.6038105
N. Weerawarna, H. M. H. R. B. Haththella, A. Ambadeniya, L. Chandrasiri, M. L. Bandara, S. Thelijjagoda
{"title":"CyberMate ∼ Artificial Intelligent business help desk assistant with instance messaging services","authors":"N. Weerawarna, H. M. H. R. B. Haththella, A. Ambadeniya, L. Chandrasiri, M. L. Bandara, S. Thelijjagoda","doi":"10.1109/ICIINFS.2011.6038105","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038105","url":null,"abstract":"Most of the existing Artificial Intelligent software agents are based on a single specific purpose whereas CyberMate is a multipurpose AI agent based on pattern recognition with Chatterbot approach to interact with remote users. The system introduces a new technology to automate customer care services by hosting business information and technical support to address inquiries by the end users. CyberMate allows remote end users to connect via Instant Messaging services and get requested information using English, Tamil, Sinhala language or any natural language. The system can act as a dedicated AI agent between client and the service hosting party that can provide information via instance messages. This is a much faster and familiar solution than hosting a Frequently Asked Questions (FAQ) page as a part of a business website and even the system can reduces the work load of the customer care service waiting queue, which leads to decrease the customer's dissatisfaction and make service accessible from any device which has Internet connectivity. The business information can be easily modeled into the CyberMate system using the newly introduced CyberMate Scripting Language (CSL) and its own development environment (CSL-IDE).","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy by information accountability for e-health systems 电子卫生系统的信息问责隐私
2011 6th International Conference on Industrial and Information Systems Pub Date : 2011-07-07 DOI: 10.1109/ICIINFS.2011.6038039
R. Gajanayake, R. Iannella, T. Sahama
{"title":"Privacy by information accountability for e-health systems","authors":"R. Gajanayake, R. Iannella, T. Sahama","doi":"10.1109/ICIINFS.2011.6038039","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038039","url":null,"abstract":"Privacy has become one of the main impediments for e-health in its advancement to provide better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信