Browsing by Author "Harshanath, B"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Embargo A Secure Protocol for Computer-Based Assessments in Disrupted Environments(Institute of Electrical and Electronics Engineers Inc., 2025) Navin, D; De Zoysa, K; Karunaratna D.D; Harshanath, BExaminations are fundamental to education, yet conducting secure computer-based exams in disrupted environments presents significant challenges. This research introduces a Secure by Design protocol leveraging Delay Tolerant Networks (DTN) to overcome connectivity gaps in remote and resource-constrained areas. The proposed solution integrates physical, administrative, and technical controls to ensure the confidentiality, integrity, and availability of examination data. Through an iterative action research approach, the system evolved from a centralized Moodle server to standalone local servers, enabling offline functionality and enhanced resilience. Tested across over 180,000 candidates in Sri Lanka's largest computer-based examination, the framework effectively addressed power outages, internet disruptions, and logistical constraints. The findings demonstrate the protocol's effectiveness in promoting equitable and reliable access to education, ensuring examination continuity despite adverse conditions.Publication Embargo Historical Places & Monuments Identification System(IEEE, 2020-11-16) Godewithana, N; Jayasena, K; Nagarawaththa, C; Croos, P; Harshanath, B; Alosius, JSri Lanka, which is known as “the pearl of the Indian ocean” provides great survival and civilization history dating back to the 3rd century. Most of the archaeological sites are attracted by not only Sri Lankans but also by tourists. When searching for the information about the archaeological sites, there are lack of trusted information sources and smart online platforms. Even though some information is available, no convenient and efficient ways to retrieve them. When trusted information is provided in a user-friendly manner, the value will be added to the Sri Lankan economy. Since the world is driving towards the "E-Era", everything is involved with Information Technology. The proposed system contributes to solve the above problems with Artificial Intelligence & Machine Learning concepts. The system is assisted using four major components namely, image identification, community platform, conversational bot, and image visualization. The image Identification component identifies the archaeological sites using image processing techniques. The community platform gathers trusted information from archaeologists and deep learning techniques are used to deliver that content to the users. The artificial intelligence conversational bot is established to communicate and retrieve available information in a convenient manner. The image visualization component is used to provide reality visualization on archaeological sites using the augmented reality techniques. The techniques and the algorithms are evaluated to deliver better performance with brilliant user experience.Item Embargo Improving Security and Accountability in Peer-to-Peer File Systems Through Metadata-Based Change Logging Techniques(Springer Science and Business Media Deutschland GmbH, 2026) Herath, H.K; Harshanath, BThe Challenge of Securing Accountability in P2P File Systems Using Change Logging and Metadata Tracking: A more efficient method of data capturing and sharing has emerged due to the advent of P2P file systems, but concerns related to security, accountability, and file tracking still remain. Similar to systems such as IPFS, there are no policies in place that adequately cater to file change management, which automatically leads to unauthorized changes or file alteration. This paper highlights P2P file system security problems and issues of accountability. It discusses possible solutions in the form of change logging and metadata tracking, revealing the complexity of the problem. Critical pointer metadata such as file size, creation date, and modification time are logged, together with editing or file deletion logs that are generated for traceability. The files are protected against alteration which guarantees authenticity. Utilizing this system improves the overall integrity of data and helps ease compliance with HIPAA and the GDPR, increasing the level of control and accountability an organization has over files in a distributed system.
