By Topic

2010 Fifth International Conference on Information and Automation for Sustainability

17-19 Dec. 2010

Filter Results

Displaying Results 1 - 25 of 99
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2297 KB)
    Freely Available from IEEE
  • [CD label]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (358 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (493 KB)
    Freely Available from IEEE
  • Brief author index

    Publication Year: 2010, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Support

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2010, Page(s):1 - 28
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Hub page - 2010 Fifth International Conference on Information and Automation for Sustainability [Breaker Page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Committee members

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Session list

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 26
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Technical Program Committee (TPC)

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Mobile based GIS for dynamic map generation and team tracking

    Publication Year: 2010, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    We present an effective solution for both digital map generation and real time user tracking for teams operating in hazardous environments or unfamiliar territory. The system is based on the client server model, where the client is a GPS enabled mobile phone which is capable of capturing coordinates and serving dynamic maps to the user. The maps plot the team's navigational routes and enables real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of edge detection algorithm in dsPIC embedded processor

    Publication Year: 2010, Page(s):8 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1418 KB) | HTML iconHTML

    The research presented here is an attempt to use a very basic, low cost and non-specialized microcontroller for image processing tasks. The applications emanating from such an attempt will result in inexpensive face detection, intelligent motion sensors to low cost vehicle counting systems. We have been able to develop a system based on Microchip dsPIC microcontroller that implements edge detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal model for masquerade detection software based upon natural mimicry

    Publication Year: 2010, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    This paper is about the development of a framework for the formal certification of software for masquerade detection based upon natural mimicry. A masquerade is when an intruder mimics a genuine user in order to compromise the security of a computer system. The framework consists of looking at mimicry in the natural world. Based on this, a model for mimicry is developed based on the principle of i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of rectangular features for the localization of fertile material in plant images

    Publication Year: 2010, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1284 KB) | HTML iconHTML

    Analysis of fertile material such as flowers and fruit is a key factor in the proper identification of plant species. Despite object recognition being a mature research area, the use of it in automated plant identification is still relatively new. This paper describes a novel method of detecting fertile material in plant images using rectangular features. Rectangular features are obtained for the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation methodology for English to Sinhala machine translation

    Publication Year: 2010, Page(s):31 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    This paper presents evaluation methodology for English to Sinhala machine translation system. The English to Sinhala machine translation system has been developed by using Multi Agent Approach and powered through the concept of "Varanegeema". Translation system works through the communication among nine agents namely English Morphological Analyzer Agent, English Parser Agent, English to Sinhala Ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial: Multipath support in IP networks

    Publication Year: 2010, Page(s):37 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Networked devices are often equipped with multiple interfaces. Legacy routing and transport protocols only support the transport of data over a single interface resp. paths. This tutorial discusses extensions for IP and TCP in order to support multiple interfaces. Multihoming and mobility management allow the simultaneous usage of interfaces by independent application data flows, while multipath t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human perception related distortion metrics for blockiness and blur compression artefacts

    Publication Year: 2010, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Objective image and video quality evaluations generally provide an overall measure of distortions. Parameter optimization and benchmarking of codecs require evaluating individual distortions. There are not many objective metrics that distinguish individual compression artefacts which are rapid to evaluate and correlate with human perception. The author of the paper presents the correlation that ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial on IPTV and its latest developments

    Publication Year: 2010, Page(s):45 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    This tutorial presents on IPTV technology. Internet Protocol television (IPTV) is a system through which television services are delivered using the architecture and networking methods of the Internet Protocol suite over a packet-switched network infrastructure. IPTV services may be classified into three main groups: live television, time-shifted programming, and video on demand. IPTV can be viewe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A statistical fuzzy inference system for classifying human constituents

    Publication Year: 2010, Page(s):51 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    In this paper, statistical fuzzy inference system based on principal component analysis (PCA) and Fuzzy Expert system for diagnosis of human constituents is introduced. This statistical fuzzy inference system deals with combination of the filtering and classification from measured PCA and Fuzzy expert system technology. This intelligent system has three phases. In acquiring tacit knowledge phase, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial on digital terrestrial television broadcasting

    Publication Year: 2010, Page(s):58 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    This tutorial presents an overview of digital terrestrial television broadcasting (DTTB), its evolution from analogue television to the second generation technologies. Main technologies that form the DTTB infrastructures and services are described in brief. Deployment of advanced coding and modulation techniques to achieve higher data rates and spectral efficiencies are described. A new concept in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network traffic self similarity measurements using classifier based Hurst parameter estimation

    Publication Year: 2010, Page(s):64 - 69
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Network traffic has been shown on numerous occasions to be self similar under normal conditions. This self similar property is however, lost during anomalous conditions such as device failure, congestion and malicious intrusions. Therefore, this loss of self similarity can be used to detect such events. The Hurst parameter (H) is the most widely accepted parameter for determining self similarity. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New set of cognitive tasks in EEG based Brain Computer Interface

    Publication Year: 2010, Page(s):70 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    A set of new mental tasks that can be used with Brain Computer Interface systems are introduced. New mental tasks are natural to perform for controlling a cursor on a computer screen to select icons. With the help of three healthy subjects, performance of new mental tasks was evaluated and compared with that of popular motor imagery mental tasks. Three subjects who participated in this study showe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Affective setting for sustainable E learning in higher education

    Publication Year: 2010, Page(s):75 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Emotions play an essential role in decision making, managing, perceiving and learning and influencing rational thinking process of humans. Emotions are also important in teaching and learning and often find expression in particular ways, such as interactions with others, our interest and motivation in learning. The influence of emotions on learning is still under-emphasized. Continuous and increas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.