RESEARCH ARTICLES

RESEARCH ARTICLES

 

Collections in this community

Recent Submissions

  • Bandara, Y.M.P.C.Y.; Niroshika, U.A.A.; Abeygunawardhane, T.U. (IEEE, 2014)
    Frame feature tracking, relative pixel distance, relative pixel direction measurement and conversion of pixel distance to real world distance are the techniques used to estimate the speed of the vehicle. The balance between ...
  • Wijeratne, S.; Jayawardena, S.; Jayasooriya, S.; Lokupathirage, D.; Patternot, M.; Kodagoda, G.N. (IEEE, 2008)
    There are several approaches to search databases of faces. However such methods still require a significant use of humans to interpret an eyewitness account and so forth. In many cases these searches are done using visual ...
  • Nawinna, D.; Venable, J.R. (Taylor & Francis, 2018-04-02)
    Social capital is an influential concept in understanding why and how some firms do better in inter-organizational relationships (IORs). It is an important factor in developing relationships of trust, making the basis for ...
  • Ariyasinghe, L.R.; Wickramasinghe, C.; Samarakoon, P.M.A.B.; Perera, U.P.B.; Prabhath Buddhika, R.A.; Wijesundara, M.N. (IEEE, 2013-04-26)
    With the rapid development of internet and related technologies, number of daily users browsing internet and amount of data being accessed keeps increasing exponentially. Internet users now access internet objects ranging ...
  • De Silva, K.K.D.; Darshana, P .H.R.A.; Silva, W.A.D.M.; Basnayake, B.M.N.A; Wickramarathne, C.J. (IEEE, 2013-04-26)
    It is believed that future technologies related to smart devices could add more towards making life easy while saving on time for a person on the go. Already mobile devices have added value to our everyday tasks. However, ...
  • Tissera, W.M.R.; Athauda, R.I.; Fernando, F.C. (IEEE, 2006)
    Data mining consists of a variety of techniques that can be used to extract relevant and interesting knowledge from vast amounts of data. Data mining has been successfully applied in a variety of domains to gain knowledge ...
  • Jayasooriya, I.U.; Nallaperuma, T.A.; Herath, U.K.; Ranasinghe, S.R.; Liyanage, M.; Tennekoon, R.L.; Rupasinghe, L. (IEEE, 2013-04-26)
    Mobile Ad Hoc Network (MANET) is an evolving concept. There are many emerging researches focused on MANET aspects such as routing and caching. Among them, the lack of efforts done on MANET web caching is acknowledged. ...
  • Weerawarna, N.T.; Haththella, H.M.H.R.B.; Ambadeniya, A.R.G.K.B.R.; Chandrasiri, L.H.S.S.; Bandara, M.S.L.; Thelijjagoda, S.S. (IEEE, 2011-08-16)
    Most of the existing Artificial Intelligent software agents are based on a single specific purpose whereas CyberMate is a multipurpose AI agent based on pattern recognition with Chatterbot approach to interact with remote ...
  • Hettigamage, J.M.; Mapatunage, M.D.C.P; Paranagama, C.B.; Chathuranga, B.C.; De Silva, D.H.; Sucharitharathna, C. (IEEE, 2013-04-26)
    Vehicle maintenance and management system, which can be described as a vehicle maintenance system embedded with GPS, avoids any delays in the maintenance system and performs necessary testing to support regulatory and ...
  • Senevirathna, S.B.; Jayawardena, C.; Perera, S.S.; Perera, C.L.; Ranasignhe, D.; Wijerathna, S.R.; Bandara, T.N. (IEEE, 2008)
    The ability of Orthogonal Frequency Division Multiplexing (OFDM) systems to achieve higher data rates and facilitate bandwidth friendly communication [1]-[3] is impaired by the presence of Carrier Frequency Offset (CFO) ...
  • Shafreen, M.A.M.; Zuhair, A.; De Silva, U.P.M.; Edirisuriya, D.M.J.; Haddela, P.S.; Kasthuriarachchy, B.H. (IEEE, 2011-08-16)
    In today’s world, corruption is on the rise. Bribery, also a form of corruption has affected every nation across the globe. With the advent of new web and mobile technologies, it has now become possible to introduce ...
  • Kannangara, D.; Fernando, N.; Dias, D. (IEEE, 2009-12-28)
    A web enabled visualization methodology is proposed in this work for viewing time varying spatial data. The technique is simple, and hence could be used by non experts of IT or GIS. The user can upload own datasets prepared ...
  • Samarakoon, L.; Kumarawadu, S.; Pulasinghe, K. (IEEE, 2011-08-16)
    This paper describes a closed domain question answering system which can be used as the first step in automating a customer helpdesk of a commercial organization. Even though there has been an increasing interest in ...
  • Wijerathna, L.; Somaweera, W.L.S.L.; Kaduruwana, S.L.; Wijesinghe, Y.V.; De Silva, D.I.; Pulasinghe, K.; Thellijjagoda, S. (IEEE, 2012)
    This paper presents a rule based machine translation system which is capable of translating sentences from Sinhala to English and vice versa. This is the first Sinhala to English and English to Sinhala machine translation ...
  • Senanayake, R.; Kumarawadu, S. (IEEE, 2012)
    Adopting a hand gesture based appliance control system would be a virtuous idea for smart homes. However, complexity of the home background makes it challenging to work such systems in real home environments. In this ...
  • De Silva, D.I.; Kodagoda, N. (IEEE, 2013-04-26)
    Although a number of complexity metrics have been proposed, only a few studies have been conducted to compare those proposed metrics to find the most effective and comprehensive metric. In general, to find the effectiveness ...
  • De Silva, D. I.; Weerawarna, N.; Kuruppu, K.; Ellepola, N.; Kodagoda, N. (IEEE, 2013-04-26)
    A number of complexity metrics has been proposed in the past. However, only a few studies have been conducted to test the relationship between those proposed complexity metrics and their applicability in the real world. ...
  • Chatterjee, A.; Pulasinghe, K.; Watanabe, K.; Izumi, K. (IEEE, 2005)
    This paper shows the possible development of particle swarm optimization (PSO)-based fuzzy–neural networks (FNNs) that can be employed as an important building block in real robot systems, controlled by voice-based commands. ...
  • Kaushalya, S.A.D.T.P.; Randeniya, R. M. R. S. B.; Liyanage, A. D. S. (IEEE, 2018-11-22)
    Social engineering in the context of information security is the exploitation of human psychology to gain access into secure data. Human emotion can act as both a strength and a weakness. When it comes to the world booming ...
  • De Silva, D.H.; Murray, I. (IEEE, 2013)
    A reliable, high speed and efficient data transfer method is a very important factor in real time Way-finding systems since it requires information with very low latency to discover paths, avoid dangerous situations, ...

View more