ITRU -2014

 

Recent Submissions

  • Nakandala, S; Withana, S; Kumarasiri, D; Jayawardena, H [Conference-Full-text]
    Cost functions used by query optimizers in database systems are built around the properties of conventional hardware technologies like spin type hard disk drives. But with the rapid development in storage technology several ...
  • Rajpirathap, S; Sheeyam, S; Umasuthan, K; Chelvarajah, A [Conference-Full-text]
    Statistical machine translation method is one of the most promising and efficient method to perform machine translation for Sri Lankan languages likes Sinhala and Tamil. Statistical approach is more suitable for ...
  • Gunasekara, UDND; Dilhani, PAC; Thiripuvaneswaran, T; Ranathunga, L [Conference-Full-text]
    Communication is an essential part of all the people in their day today life. We can see various modes of communication with one another in our society. Ordinary people can communicate with each other using any language ...
  • Lakshantha, E [Conference-Full-text]
    This paper presents our initial experimental work on monitoring human performance with a novel Augmented Reality framework. The aim of this novel framework is to use it for controlling robots in everyday environments such ...
  • Perera, KMS; Weerasinghe, H [Conference-Full-text]
    Public key cryptography is an important aspect in Information Security. Since RSA is the most widely used and accepted public key algorithm so far, many proven applications based on the RSA algorithm are widely used ...
  • Ekanayake, DC; Gunasekara, RGAD; Weerasinghe, KHWMMM; Deemanthi, SHS; Sandanayake, TC; Fernando, S [Conference-Full-text]
    Performance appraisal is a process used by companies, in order to evaluate the employees efficiency and productivity. This process can be carried out in different ways, by employees supervisors or by different ...
  • Yatanwala, YWTM; Senadeera, KMSK; Ruhunuwickrama, OPI; Wijepala, NGNP; Ranathunga, L [Conference-Full-text]
    CCTV Surveillance Systems have been used in many places to address security issues. Those systems will store a large amount of activities in every moment and most of the times data is stored in separate places without ...
  • Rupasinghe, RADK; Ailapperuma, DCR; De Silva, PMBNE; Siriwardana, AKG; Sudantha, BH [Conference-Full-text]
    A portable system for deaf and hearing impaired people has been developed based on the IEEE 1451 sensor standards and other related technologies to minimize their communication difficulties with the ordinary society. The ...
  • Liyanaarachchi, VA; Jayasuriya, DB; Adikari, AS; Rodgrio, ST; Karunaratne, I [Conference-Full-text]
    Handwriting, being the main medium of written communication is now being overpowered by the digital technologies. There is a significant interest in addressing this issue and in facilitating handwriting recognition via ...
  • Sandakalum, MKDNP; Kulawansa, KADT [Conference-Full-text]
    One of the major concerns in mobile applications is the processing power and memory. In the meantime when an application uses a lot of processing and memory it tends to reduce the battery life of the device. This is ...