2018 IRC Articles: Recent submissions
Now showing items 241-260 of 307
-
Effects of Leadership Styles on Soldiers` Turnover Intention of Sri Lanka Army
(2018)Leaders are known to practice different leadership styles to accomplish missions in the Army. Thus the challenge for Sri Lanka Army leadership is to ensure that leadership practices in organizations are in accordance with ... -
A Study on 'Aawa Gang` : Measures to Overcome Future Threats to National Security of Sri Lanka
(2018)Three decades of civil war marked the end of the defeat of LTTE terrorism through a war victory in 2009. Since then, Sri Lanka has been experiencing a post-conflict phase throughout past nine years. The ‘conflict trap ... -
Formulating of an Integrated Air Defence System As a Response to Contemporary Threat
(2018)Air Defence (AD) is one of the prime security concerns in modern security concepts. With the rapid development in the field of military aviation, necessity of AD is becoming an important security arrangement worldwide. ... -
Cyber Security in the Modern World: an Analysis of Cyber Security and Legal Framework in Three Asian Countries
(2018)The advent of information technology has resulted in advanced but virtual or cyber security threats, which decree that all nation states must safeguard their virtual boundaries and information with the same fervour as their ... -
Engineering High Performing Systems
(2018) -
Rice Yield Estimation Using Free Satellite and Field Data
(2018)An effective pre-harvest rice yield estimation method is truly significant for the assessment of seasonal rice production in terms of strategic planning purposes. In Sri Lanka, a conventional method named crop-cut survey ... -
Internet of Things Based Falls Detection and Heart Attack Detection System for Adults : Smart Wearable
(2018)In the new era of communications and technology the Internet of Things (IoT) connects devices, sensors, appliances, people, and things. The IoT can help to enhance the living style of the humans in wider area. Most importantly ... -
The Rashomon Effect on Software Development Requirement Gathering Process
(2018)A software project, whatever the size must go through defined stages which known as the Software Development Lifecycle (SDLC). Among five phases of the SDLC the first phase: Requirement Definition needs certain technique ... -
A Review of Mobile Technology for Teaching and Learning Mathematics
(2018)Today, the claim of Mathematics is more critical than ever. Almost everything in the world is relying on mathematics. The subjects like mathematics can be known as a requisite subject of the school curriculum which is ... -
Consistency in Multiplayer Online Game in Continuous Domain
(2018)This paper describes the ways to maintain the consistency in Multiplayer Online Games (MPOGs) in continuous domain. The involvement of computer networking, computer graphics, multimedia, artificial intelligence makes the ... -
Hairstyle Recommendation Based on Face Shape Using Image Processing
(2018)Hairstyling is an art of fashion transformed since ancient era, with the influences from many diverse factors. It has been a primary aspect of human lifestyle and society in various different ways with the growth of research ... -
Smart Tea Leaves Disease Analyser: Mobile Based Disease Detecting and Solutions Providing System
(2018)Sri Lanka is well-known for its excellent TEA and as the 3rd largest tea manufacturing nation internationally. Sri Lanka is one of the main world’s top TEA exporters with a high global demand attracting millions of foreign ... -
Fast and Accuracy Palm-Print Recognition System for Low-Quality Patterns
(2018)Palm-print trait based biometric identification has emerged as a most powerful tool to recognize a person’s identity. It is used in commercial and forensic applications. In common, it considers high 400 dpi (Dots per ... -
Workers’ Alcohol Detection and Prevention System
(2018)Factories are industries of vital importance, and they operate with two main resources, machinery and manpower. When dealing with Machines, workers should work carefully as an error could lead to injury or loss of life and ... -
Data Security System for Chat Applications Using Cryptography, Steganography and Image Processing
(2018)The privacy plays a major role in the personal life. Due to the vast development in communication technology, people have the privilege to perform various operations seamlessly in their day to day life. But at the same ... -
A Review on Data Mining Techniques to Predict the Student Performance and Decision Making in Educational Institutions
(2018)Education is significant as it represents the future of a nation. Most of the Sri Lankan educational institutions utilize manual, paper-based systems to manage information which are more time and money consuming. It also ... -
A Software Solution for Image Identification and Artistic Skills for Visually Impaired People Using Braill
(2018)At present, visually impaired individuals have no method to perform or engage much in art. They do not draw paintings because of the absence of the ability to draw a world unknown and unseen before. New immerging software ...
