By Topic

Industrial and Information Systems, 2007. ICIIS 2007. International Conference on

Date 9-11 Aug. 2007

Filter Results

Displaying Results 1 - 25 of 110
  • Proceedings of the second international conference on industrial and information systems - 2007

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (85 KB)  
    Freely Available from IEEE
  • Second international conference on industrial and information systems 2007

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (235 KB)  
    Freely Available from IEEE
  • [Copyright and reprint permission]

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (141 KB)  
    Freely Available from IEEE
  • Table of content

    Page(s): iii - x
    Save to Project icon | Request Permissions | PDF file iconPDF (214 KB)  
    Freely Available from IEEE
  • A leader election algorithm for clustered groups

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (99 KB) |  | HTML iconHTML  

    Many distributed systems have a coordinator and a number of grouppsilas members that coordinator is responsible for coordinating them. Obviously, in such system reliable multicasting is important but offering reliable multicasting services in large groups has many problems and is difficult. One way of solving these problems is using hierarchical structures. A problem in hierarchical structure is holding election when coordinator or a local coordinator crashes. Unfortunately existence election algorithms such as bully and ring donpsilat support hierarchical structure. In this paper, we introduce a new election algorithm for hierarchical groups. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecting secure Web Services through policies

    Page(s): 5 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (478 KB) |  | HTML iconHTML  

    As Web services begin to dominate the market of distributed computing, securing the pipelines from intruders is becoming a mission, which cannot be considered as trivial anymore. As businesses adopt web services due to its very attractive features like platform independency, ease of implementation, unprecedented support from major vendors and ability of seamlessly interfacing with legacy systems, they unsuspectingly expose themselves into a zone filled with security loop holes which can pose a great threat to confidential data which might be travelling through the channels using these services. This paper proposes a comprehensive security solution for securing Web services through the use of policies. In an era where Web services are building bridges across heterogeneous systems the need of a security solution, which can seamlessly integrate itself into the existing Web service infrastructures of businesses, is becoming more and more apparent. Thus a solution, which can be easily incorporated into the existing infrastructures with minimum cost and effort on the part of the developers and businesses are proposed here. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority based distributed job scheduler for java compute servers

    Page(s): 11 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    JavaSpace is a Java based implementation of shared memory distributed system introduced by Gelernter in 1985. Federation of shared memory space type distributed system with the basic command pattern has yielded a very powerful distributed systems architecture, which is known as Java compute servers. Java compute servers leverage the power of shared memory space based distributed systems in addition to the ability to perform any activitycomputation by any processing node within the system. Java compute servers perform distributed processing through the shared memory space, where a process known as the master process, places the task that is required processing to the shared memory space. Process known as workers randomly read these entries in the shared memory space and perform the computation and writes back the results to the shared space, were it will be picked up by the master process and delivers to the source of the task. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environment Monitoring System for Distributed Network Cabinets in Typical Campus Network

    Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (730 KB) |  | HTML iconHTML  

    A typical distributed local area network often consists of one or more network distribution cabinets powered by uninterrupted power supplies of various capacities ranging from 400 VA to 2 KVA. dasiaEnvironment Monitoring System for Distributed Network Cabinets in Typical Campus Networkpsila is intended to provide effective monitoring of environment and timely notifications of status or interruptions to background services such as electricity and temperature control of the distributed network locations by a remote unit installed in each remote location. The status of the remote location is sent back to a central software module through Ethernet network then to appropriate technical personnel for necessary actions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and demonstration of the usage of a virtual honeynet for monitoring and recording online attacks

    Page(s): 21 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1664 KB) |  | HTML iconHTML  

    Even though the Internet has revolutionized our perception of global communications and business, it is also feared as one of the stealthiest threats to both individuals and organizations alike. The threats posed vary from simple port scans to the distribution of viruses, worms and the deployment of distributed denial of service attacks by malicious Hackers, also known as Blackhats. This project addresses the above problem domain and strives to provide a reliable mechanism to gather information of suspected and ongoing attacks through the implementation of a virtual honeynet. The acquired information could be used to build enhanced security measures against Blackhat attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the decision-making process for the adoption of Enterprise Resource Planning systems in Sri Lankan business environment

    Page(s): 27 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (979 KB) |  | HTML iconHTML  

    Enterprise resource planning (ERP) systems have been adopted by many Sri Lankan businesses in the past decade. This paper reports on a research project that analyses the decision making process for the adoption of enterprise resource planning systems in Sri Lankan business environmentpsila. The awareness of the decision makers about the strategic and the operational part of the adoption decision making process is evaluated in the paper. The process goes beyond evaluating software to consider the readiness of the organization to undergo a massive changing process in all aspects of the business. Also this paper reveals the differences in decision making among different levels of managers of organizations in the process of enterprise resource planning system adoption decision. The enterprise resource planning system adoption decision making process is viewed not only as a simple software selection process but also as a total cultural transformation in a business organization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Insight to the large scale Information Systems implementation in Sri Lanka

    Page(s): 33 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (890 KB) |  | HTML iconHTML  

    Information is so crucial for today's business organizations and therefore it has become an important asset. Information Systems (IS) have emerged to accomplish the task of managing valuable information. Large businesses have very complex information requirements thus requiring complex IS namely "large scale IS". In the last few decades, the failure rate of enterprise systems as studied by the researchers were almost 50% ~ 90% and most of these IS failures resulted from poor implementation practices adopted by the implementers. This makes it sound studying and identifying the factors that affect the successful implementation of large scale IS. This research focuses on developing and testing a model for successful large scale IS implementation by identifying critical success factors. The analysis of gathered data reveals that the factors affecting the implementation of large scale IS can be distinctly categorised in to six perspectives explicitly Individual, Task, Technology, Structure, Process & Environmental factors. Further analysis on data shows that these factors can again be overlooked in two dimensions, factors affecting the pre- implementation stage and implementation stage. These six distinct categories were put into four phases according to their priority of consideration. The set of critical success factors, enhanced implementation framework, threshold values of the identified critical success factors were the conclusions derived from this research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SAS-3: A polynomial based strong password authentication protocol

    Page(s): 41 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (511 KB) |  | HTML iconHTML  

    As the Internet and mobile applications have been increasing in the recent past, the need for authentication over remote servers and telephones have become very important. The need of authentication is essential as the private data sent over the Internet has risk of being wiretapped. Existing password authentication schemes can be divided into two types, one that requires only the weak password and the other that requires the strong password. The main objective of this paper is to present a review on the strong password protocols and propose a new protocol with enhanced security features. In addition, we have proved that our SAS-3 (simple and secure) protocol is secure against replay, denial of service, impersonation and password guessing attacks with minimized computational and transmission overheads. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimum filter design for detecting QRS complexes in a cardiac signal — GA based approach

    Page(s): 47 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (793 KB) |  | HTML iconHTML  

    A technique for designing optimized filters by optimizing filter parameters could be used for detecting QRS complexes in electrocardiogram has been discussed. This system includes three stages. A pre amplifier stage, an anti alias filter for filter out unwanted higher frequencies with cutoff frequency 50 Hz and a eighth order Butterworth band pass filter to filter out noises in near desired frequencies and get the required signal with pass band of 10 Hz to15 Hz. Parameters of both filter stages are optimized using genetic algorithm based method for best suit to the application. Results show optimized filters can be derived with this technique with successful accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information integration in a collaborative web portal along the spatial dimension

    Page(s): 53 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (729 KB) |  | HTML iconHTML  

    The increasing use of the World Wide Web give rise to an incessant flow of new information. An example is the collaborative web portal developed at the University of Colombo School of Computing. It allows the generation of a large amount of spatially referenced, domain un-restricted information through community input. Some of this information is redundant, some erroneous, and some plainly malicious. In order for this information to be made useful, the task of integrating it to a coherent whole and of presenting it in a usable way has to be undertaken. This paper presents an effort at accomplishing this task through the utilization of the spatial dimension as a central pivot around which to integrate the data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Fast-Marching method on mammograms for breast skin-line estimation

    Page(s): 59 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (751 KB) |  | HTML iconHTML  

    Breast skin-line estimation and breast segmentation from its background is an important pre-process in mammogram image processing and computer-aided diagnosis of breast cancer. Ultimate goal of this pre-processing task is to recognize the breast tissue region on a mammogram and limit the area to be processed into a specific target region. This will increase the efficiency and accuracy of computer-aided diagnosis of breast cancer using mammograms. Also, the Fast-Marching is a method developed by J.A. Sethian. Fast-marching is a partial differential equation based numerical technique to track evolution of interfaces. This method has a higher potential of handling topological changes of evolving fronts naturally. In this paper we are discussing possibility of using fast-marching method for estimating breast skin-line and segmenting breast tissue region from its background. We have introduced some modifications to the traditional fast-marching method, specifically to improve the accuracy of skin-line estimation and breast tissue segmentation. In this experiment we have used 30 mammogram images from mini-MIAS mammogram image database to evaluate the results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fabrication and characterization of nano-structured conducting polymer electrodes for glucose biosensor applications

    Page(s): 63 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    This work describes fabrication and characterization of a novel nano-porous polypyrrole (PPy) electrode and its application in amperometric biosensors. Nano-porosity was artificially introduced into PPy films by using Pt sputtered nano-porous Alumina discs as base electrodes during polymerization. The resulting nano-structured PPy has helped increasing the performances of biosensors by increased effective surface area for detection of electron flow. When GOx was immobilized by physical adsorption, the sensor showed much stability against H2O2 and enhanced characteristics for glucose sensing. This sensor resulted in rapid, simple, and accurate measurements with high sensitivities (3.7 AM-1cm-2 and 3 mAM-1cm-2 for H2O2 and glucose respectively) and very fast response times (3 s in each case). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A zone based self repairing SRAM architecture using adaptive body biasing schemes

    Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (633 KB) |  | HTML iconHTML  

    In nano scale devices, the major barrier that the CMOS devices face is increasing process parameter variations. The inter-die and intra-die variations in process parameters results in large number of failures in area constrained circuits such as SRAM cell, thus degrading the design yield. Adaptive repairing techniques such as adaptive body bias reduce the failure probabilities thus increasing the design yield. To apply this technique we have to distinguish between the dies from low-Vt process corners and those from high-Vt process corners. In this paper, we propose a new zone based repairing scheme for the dies, which fall in high-Vt corner by which the efficiency of the adaptive repairing technique can be improved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simultaneous localization and mapping (SLAM) based on pseudolinear measurement model with a bias reduction approach

    Page(s): 73 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (450 KB) |  | HTML iconHTML  

    This paper describes an improved solution to mobile robot localization and map building problem based on pseudolinear measurement model through bias reduction approach. Accurate estimation of vehicle and landmark states is one of the key issues for successful mobile robot navigation if the configuration of the environment and initial robot location are unknown. Direct linearization of nonlinear models has always come up with information loss of original nonlinear models. A state estimator which uses linearized models can be a solution to a problem where high accuracy is not expected. A state estimator which can be designed to use the nonlinearity as it is coming from the original model has always been invaluable in which high accuracy is expected. Thus to accomplish the above highlighted point, pseudolinear measurement model is directly applied to the Kalman filter equations without losing the original nonlinearity. We address the pseudolinear bias problem through simple geometry translation of system states. This system is simulated using Matlab for vehicle-landmarks system and results show that the new approach performs much accurately compared to that of well known extended Kalman filter (EKF). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability improvement of two wheel mobile manipulator by real time gain control technique

    Page(s): 79 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1076 KB) |  | HTML iconHTML  

    Two wheeled mobile manipulator has significant role in industry as well as domestic environment when working space of robot is limited. On the other hand, improvement of two wheeled vehicle will explore the technology to improve welfare like wheelchair robot and industrial robots. Two wheeled mobile manipulator has been already implemented using inverted pendulum control. However, dynamic stability has to be improved further. And also, trajectory error has to be minimized. This paper propose the method to improve the stability of the robot by changing the controller gains on runtime based on the robot parameter during the running. Disturbance observer has been employed to cancel the disturbances. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agricultural robotics: A streamlined approach to realization of Autonomous Farming

    Page(s): 85 - 90
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (471 KB) |  | HTML iconHTML  

    This paper presents a streamlined approach to future Precision Autonomous Farming (PAF). It focuses on the preferred specification of the farming systems including the farming system layout, sensing systems and actuation units such as tractor-implement combinations. The authors propose the development of the Precision Farming Data Set (PFDS) which is formed off-line before the commencement of the crop cultivation and discusses its use in accomplishing reliable, cost effective and efficient farming systems. The work currently in progress towards the development of autonomous farming vehicles and the results obtained through detailed mathematical analysis of example actuation units will also be presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Taguchi technique to reduce positional error in two degree of freedom rotary-rotary planar robotic arm

    Page(s): 91 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1574 KB) |  | HTML iconHTML  

    In present work, positional accuracy of robotic arm has been discussed. The factors considered in the experiment were the length of links, the mass of both links, the velocity of end point and torque on both links. A considerable reduction in performance variation can be obtained by Taguchi technique. Through simple multifactorial experiments on manipulator, controlled factors can be isolated to provide centering and variance control for a process variable. The primary objective in present work is to investigate the effect of process parameter on performance variation to improve positional accuracy. An attempt has been made to introduce a small variation to current approaches broadly called Taguchi parametric design method. In these methods, there are two broad categories of problems associated with simultaneously minimizing performance variations and bringing the mean on target, viz. Type 1- minimizing variations in performance caused by variations in noise factors (uncontrolled parameters); Type 2-minimizing variations in performance caused by variations in control factors (design variables). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the simplest fuzzy two - term controller structure derived via algebraic product t-norm - bounded sum t-conorm - Mamdani minimum inference combination

    Page(s): 97 - 100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    Patael and Mohan (2002, Automatica, 38, 981-993) state that the analytical structure of the simplest fuzzy PI controller, derived via algebraic product t-norm, bounded sum t-conorm and Mamdani minimum inference, is not suitable for control purpose. Here we show that the above statement is incorrect, and the above analytical structure is very much suitable for control. Moreover, using the well-known small gain theorem we establish sufficient conditions for bounded-input bounded-output (BIBO) stability of feedback systems containing the above controller as a subsystem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic based bridge management system for handheld devices

    Page(s): 101 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (634 KB) |  | HTML iconHTML  

    The paper aims at presenting initial development of prototype system for bridge inspection, condition evaluation and record maintenance. The system is supposed to be accessible from handheld devices such as common mobile phones and personal digital assistants, for the system to be easily usable at a remote location too. It will also be free from the network availability constraints in case of mobile phones. In short, it will be an entirely standalone application. In the proposed system the procedure of inspection is standardized and the analysis is done qualitatively. The linguistic data is converted to mathematical format for its assessment by the use of popular fuzzy logic approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic based traffic light controller

    Page(s): 107 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (850 KB) |  | HTML iconHTML  

    Traffic congestion is a major concern for many cities throughout the world. Developing a sophisticated traffic monitoring and control system would result in an effective solution to this problem. In a conventional traffic light controller, the traffic lights change at constant cycle time. Hence it does not provide an optimal solution. Many traffic light controllers implemented in current practice, are based on the 'time-of-the-day' scheme, which use a limited number of predetermined traffic light patterns and implement these patterns depending upon the time of the day. These automated systems do not provide an optimal control for fluctuating traffic volumes. A traffic light controller based on fuzzy logic can be used for optimum control of fluctuating traffic volumes such as over saturated or unusual load conditions. The objective is to improve the vehicular throughput and minimize delays. The rules of fuzzy logic controller are formulated by following the same protocols that a human operator would use to control the time intervals of the traffic light. The length of the current green phase is extended or terminated depending upon the 'arrival' i.e. the number of vehicles approaching the green phase and the 'queue' that corresponds to the number of queuing vehicles in red phases. A prototype system for controlling traffic at an intersection is designed using VB6 and Matlab tool. The traffic intersection is simulated in VB6 and the data regarding the traffic parameters is collected in VB6 environment. The decision on the duration of the extension is taken using the Matlab tool. This decision is based on the Arrival and Queue of vehicles, which is imported in Matlab from VB6 environment. The time delay experienced by the vehicles using the fixed as well as fuzzy traffic controller is then compared to observe the effectiveness of the fuzzy traffic controller. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Support for spinning reserve from DFIG based wind turbines

    Page(s): 111 - 116
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (542 KB) |  | HTML iconHTML  

    With the increased penetration of wind power, wind turbines are now expected to provide ancillary services presently performed by large synchronous generators. Among the ancillary services, frequency duties are vital and a number of papers are available in the literature to demonstrate the possibility of using DFIG based wind turbine for inertia, primary and secondary frequency support. This paper describes the possibility of using DFIG based wind turbine for supplying spinning reserve. The mode of operation is described and simulation results are included. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.