Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038102
S. Weerasekara, P. Abeygunawardhana
Usage of internet is rapidly increasing in Sri Lanka. However, usage of internet banking is very slow compared to increase of internet users. This study will focus on four main possible areas which may effect to slow adaptation of Internet Banking as Awareness & Knowledge of Internet Banking, Perceived Characteristics of Internet Banking, Consumer Resistance to Change, Legal Support and IS Security. Based on the data gathered, these 4 conditions are tested using statically analysis method.
{"title":"An empirical study on slow and limited adoption of Internet Banking by Sri Lankan customers","authors":"S. Weerasekara, P. Abeygunawardhana","doi":"10.1109/ICIINFS.2011.6038102","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038102","url":null,"abstract":"Usage of internet is rapidly increasing in Sri Lanka. However, usage of internet banking is very slow compared to increase of internet users. This study will focus on four main possible areas which may effect to slow adaptation of Internet Banking as Awareness & Knowledge of Internet Banking, Perceived Characteristics of Internet Banking, Consumer Resistance to Change, Legal Support and IS Security. Based on the data gathered, these 4 conditions are tested using statically analysis method.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123198577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038099
M. Chanaka, K. Shanthi, R. Perera
Performance of power transmission lines has a great impact on reliability of a particular power supply system of a country. Unreliable power transmission lines can even lead to total power failures resulting with great financial losses. The lightning back flashover effects are recognized as one of the major causes of transmission line outages, especially in tropical countries with frequent lightning. Several types of solutions are presently available to address the issue of lightning back flashovers. However, the modern concept of transmission line mounted surge arresters is of great popularity due to its excellent performance, ease of installation and the low cost compared to the other solutions. This paper describes a case study carried out on one of the critical hill-country 220kV power transmission lines of the Sri Lankan transmission network, having several past records of lightning back flashover related outages leading to total system failures. The study described in this paper mainly focuses on the way of analyzing the back flashover events by transient modeling and subsequent simulation of the selected transmission line in an electromagnetic transient computer program. The study uses the Power System CAD (PSCAD) software program as the software tool for the purpose of modeling and simulation. Simulations are carried out with and without Transmission Line Arrester (TLA) to evaluate TLA's impact on back flashover. The results of the simulations show that the installation of 02nos. of TLA at top phases of each selected towers improve the overall performance.
{"title":"Modeling of power transmission lines for lightning back flashover analysis (A case study: 220kV Biyagama-Kotmale transmission line)","authors":"M. Chanaka, K. Shanthi, R. Perera","doi":"10.1109/ICIINFS.2011.6038099","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038099","url":null,"abstract":"Performance of power transmission lines has a great impact on reliability of a particular power supply system of a country. Unreliable power transmission lines can even lead to total power failures resulting with great financial losses. The lightning back flashover effects are recognized as one of the major causes of transmission line outages, especially in tropical countries with frequent lightning. Several types of solutions are presently available to address the issue of lightning back flashovers. However, the modern concept of transmission line mounted surge arresters is of great popularity due to its excellent performance, ease of installation and the low cost compared to the other solutions. This paper describes a case study carried out on one of the critical hill-country 220kV power transmission lines of the Sri Lankan transmission network, having several past records of lightning back flashover related outages leading to total system failures. The study described in this paper mainly focuses on the way of analyzing the back flashover events by transient modeling and subsequent simulation of the selected transmission line in an electromagnetic transient computer program. The study uses the Power System CAD (PSCAD) software program as the software tool for the purpose of modeling and simulation. Simulations are carried out with and without Transmission Line Arrester (TLA) to evaluate TLA's impact on back flashover. The results of the simulations show that the installation of 02nos. of TLA at top phases of each selected towers improve the overall performance.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132482587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038084
S. Padma, S. Kumar, R. Manavalan
This paper focuses on performance evaluation of the classification algorithms for problems of unbalanced and balanced large data sets. Three methods such as ELM, MRAN, and SRAN have been proposed for solving the set classification problem and studied. The ELM is based on randomly chosen hidden nodes and analytically determines the output weights of SLFNs. Then the next method M-RAN is a sequential learning radial basis function neural network which combines the growth criterion of the resource allocating network (RAN) of Platt with a pruning strategy based on the relative contribution of each hidden unit to the overall network output. The last method SRAN uses of misclassification information and hinge loss error in growing/learning criterion helps in approximating the decision function accurately. The performance evaluation using balanced and imbalanced data sets shows that one of the proposed algorithms SRAN generates minimal network with higher classification performance.
{"title":"Performance analysis for classification in balanced and unbalanced data set","authors":"S. Padma, S. Kumar, R. Manavalan","doi":"10.1109/ICIINFS.2011.6038084","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038084","url":null,"abstract":"This paper focuses on performance evaluation of the classification algorithms for problems of unbalanced and balanced large data sets. Three methods such as ELM, MRAN, and SRAN have been proposed for solving the set classification problem and studied. The ELM is based on randomly chosen hidden nodes and analytically determines the output weights of SLFNs. Then the next method M-RAN is a sequential learning radial basis function neural network which combines the growth criterion of the resource allocating network (RAN) of Platt with a pruning strategy based on the relative contribution of each hidden unit to the overall network output. The last method SRAN uses of misclassification information and hinge loss error in growing/learning criterion helps in approximating the decision function accurately. The performance evaluation using balanced and imbalanced data sets shows that one of the proposed algorithms SRAN generates minimal network with higher classification performance.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038038
Janaka Alawatugoda, Darshana Jayasinghe, R. Ragel
Cache timing attack is a type of side channel attack where the leaking timing information due to the cache behaviour of a crypto system is used by an attacker to break the system. Advanced Encryption Standard (AES) was considered a secure encryption standard until 2005 when Daniel Bernstein claimed that the software implementation of AES is vulnerable to cache timing attack. Bernstein demonstrated a remote cache timing attack on a software implementation of AES. The original AES implementation can methodically be altered to prevent the cache timing attack by hiding the natural cache-timing pattern during the encryption while preserving its semantics. The alternations while preventing the attack should not make the implementation very slow. In this paper, we report outcomes of our experiments on designing and implementing a number of possible countermeasures.
{"title":"Countermeasures against Bernstein's remote cache timing attack","authors":"Janaka Alawatugoda, Darshana Jayasinghe, R. Ragel","doi":"10.1109/ICIINFS.2011.6038038","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038038","url":null,"abstract":"Cache timing attack is a type of side channel attack where the leaking timing information due to the cache behaviour of a crypto system is used by an attacker to break the system. Advanced Encryption Standard (AES) was considered a secure encryption standard until 2005 when Daniel Bernstein claimed that the software implementation of AES is vulnerable to cache timing attack. Bernstein demonstrated a remote cache timing attack on a software implementation of AES. The original AES implementation can methodically be altered to prevent the cache timing attack by hiding the natural cache-timing pattern during the encryption while preserving its semantics. The alternations while preventing the attack should not make the implementation very slow. In this paper, we report outcomes of our experiments on designing and implementing a number of possible countermeasures.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038033
G. Singh, Mithilesh Kumar
Recent developments in the wireless communication industry continue to drive the requirements for small, compatible, and affordable reconfigurable antennas. To overcome the challenges of multi-frequency operation a new scheme of frequency reconfiguration is proposed. In the proposed design a rectangular patch antenna with slots at the centre frequency 10 GHz that can be reconfigured in the frequency range of 10–10.5 GHz. The reconfiguration is carried out by switching the diodes ON/OFF. The antenna is designed on FR4 substrate (εr= 4.54) of thickness (H) 1.50 mm. The proposed structure was simulated by using the electromagnetic (EM) simulation software. The simulated return loss for different configuration are less than −10dB at resonance frequencies. The simulated are very exciting and show the close agreement with proposed design.
{"title":"Design of frequency reconfigurable microstrip patch antenna","authors":"G. Singh, Mithilesh Kumar","doi":"10.1109/ICIINFS.2011.6038033","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038033","url":null,"abstract":"Recent developments in the wireless communication industry continue to drive the requirements for small, compatible, and affordable reconfigurable antennas. To overcome the challenges of multi-frequency operation a new scheme of frequency reconfiguration is proposed. In the proposed design a rectangular patch antenna with slots at the centre frequency 10 GHz that can be reconfigured in the frequency range of 10–10.5 GHz. The reconfiguration is carried out by switching the diodes ON/OFF. The antenna is designed on FR4 substrate (εr= 4.54) of thickness (H) 1.50 mm. The proposed structure was simulated by using the electromagnetic (EM) simulation software. The simulated return loss for different configuration are less than −10dB at resonance frequencies. The simulated are very exciting and show the close agreement with proposed design.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038080
C. E. Ugalde-Loo, J. Ekanayake
Wind penetration into electricity grids has been significant over the last decades. The need of comprehensive studies to identify the interactions between wind farms with the power system has been recognised. In line with this, the individual channel analysis of induction generator-based wind turbines is presented in this paper. Individual channel analysis and design (ICAD) is a frequency domain framework with the help of which the investigation of the potential and limitations for control design of multivariable systems can be assessed. Under this framework, a formal evaluation of the internal coupling inherent to variable-speed wind turbines is carried out — with the coupling being quantified in the frequency domain through ICAD's multivariable structure function (MSF). Results offer formal insight into wind turbine control strategies based on vector control. Moreover, an appropriate analysis of the MSFs shows that the use of compensation loops may not be necessary to achieve a satisfactory control system design.
{"title":"Individual channel analysis of induction generator-based wind turbines","authors":"C. E. Ugalde-Loo, J. Ekanayake","doi":"10.1109/ICIINFS.2011.6038080","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038080","url":null,"abstract":"Wind penetration into electricity grids has been significant over the last decades. The need of comprehensive studies to identify the interactions between wind farms with the power system has been recognised. In line with this, the individual channel analysis of induction generator-based wind turbines is presented in this paper. Individual channel analysis and design (ICAD) is a frequency domain framework with the help of which the investigation of the potential and limitations for control design of multivariable systems can be assessed. Under this framework, a formal evaluation of the internal coupling inherent to variable-speed wind turbines is carried out — with the coupling being quantified in the frequency domain through ICAD's multivariable structure function (MSF). Results offer formal insight into wind turbine control strategies based on vector control. Moreover, an appropriate analysis of the MSFs shows that the use of compensation loops may not be necessary to achieve a satisfactory control system design.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038072
C. Mediwaththe, Kasun E. Wijethilake, D. B. W. Abeywardana, Sachini E. Wijethilake, J. Wijayakulasooriya, D. Uduwawala
This paper describes an Electrical capacitance Tomography (ECT) based sensor system designed for noninvasive cross sectional imaging of an object. It uses relative capacitance measurements of 8 electrodes placed along the peripheral of the sensor system to obtain the cross sectional image. The use of Linear Back Projection Algorithm (LBPA) to estimate the cross sectional image is demonstrated. Also, it is shown that iterative reconstruction methods can be used to further improve the results.
{"title":"Non invasive cross sectional imaging using electric capacitance tomography","authors":"C. Mediwaththe, Kasun E. Wijethilake, D. B. W. Abeywardana, Sachini E. Wijethilake, J. Wijayakulasooriya, D. Uduwawala","doi":"10.1109/ICIINFS.2011.6038072","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038072","url":null,"abstract":"This paper describes an Electrical capacitance Tomography (ECT) based sensor system designed for noninvasive cross sectional imaging of an object. It uses relative capacitance measurements of 8 electrodes placed along the peripheral of the sensor system to obtain the cross sectional image. The use of Linear Back Projection Algorithm (LBPA) to estimate the cross sectional image is demonstrated. Also, it is shown that iterative reconstruction methods can be used to further improve the results.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-16DOI: 10.1109/ICIINFS.2011.6038105
N. Weerawarna, H. M. H. R. B. Haththella, A. Ambadeniya, L. Chandrasiri, M. L. Bandara, S. Thelijjagoda
Most of the existing Artificial Intelligent software agents are based on a single specific purpose whereas CyberMate is a multipurpose AI agent based on pattern recognition with Chatterbot approach to interact with remote users. The system introduces a new technology to automate customer care services by hosting business information and technical support to address inquiries by the end users. CyberMate allows remote end users to connect via Instant Messaging services and get requested information using English, Tamil, Sinhala language or any natural language. The system can act as a dedicated AI agent between client and the service hosting party that can provide information via instance messages. This is a much faster and familiar solution than hosting a Frequently Asked Questions (FAQ) page as a part of a business website and even the system can reduces the work load of the customer care service waiting queue, which leads to decrease the customer's dissatisfaction and make service accessible from any device which has Internet connectivity. The business information can be easily modeled into the CyberMate system using the newly introduced CyberMate Scripting Language (CSL) and its own development environment (CSL-IDE).
{"title":"CyberMate ∼ Artificial Intelligent business help desk assistant with instance messaging services","authors":"N. Weerawarna, H. M. H. R. B. Haththella, A. Ambadeniya, L. Chandrasiri, M. L. Bandara, S. Thelijjagoda","doi":"10.1109/ICIINFS.2011.6038105","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038105","url":null,"abstract":"Most of the existing Artificial Intelligent software agents are based on a single specific purpose whereas CyberMate is a multipurpose AI agent based on pattern recognition with Chatterbot approach to interact with remote users. The system introduces a new technology to automate customer care services by hosting business information and technical support to address inquiries by the end users. CyberMate allows remote end users to connect via Instant Messaging services and get requested information using English, Tamil, Sinhala language or any natural language. The system can act as a dedicated AI agent between client and the service hosting party that can provide information via instance messages. This is a much faster and familiar solution than hosting a Frequently Asked Questions (FAQ) page as a part of a business website and even the system can reduces the work load of the customer care service waiting queue, which leads to decrease the customer's dissatisfaction and make service accessible from any device which has Internet connectivity. The business information can be easily modeled into the CyberMate system using the newly introduced CyberMate Scripting Language (CSL) and its own development environment (CSL-IDE).","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-07DOI: 10.1109/ICIINFS.2011.6038039
R. Gajanayake, R. Iannella, T. Sahama
Privacy has become one of the main impediments for e-health in its advancement to provide better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.
{"title":"Privacy by information accountability for e-health systems","authors":"R. Gajanayake, R. Iannella, T. Sahama","doi":"10.1109/ICIINFS.2011.6038039","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038039","url":null,"abstract":"Privacy has become one of the main impediments for e-health in its advancement to provide better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}