MSc in Information Technology

Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/2484

Students enrolled in the MSc in Information Technology programme are required to submit a thesis as a compulsory component of their degree requirements. This collection features merit-based theses submitted by postgraduate students specialising in Information Technology. Abstracts are available for public viewing, while the full texts can be accessed on-site within the library.

Browse

Search Results

Now showing 1 - 8 of 8
  • Thumbnail Image
    PublicationOpen Access
    lOT enabled Recognition based attendance Management System
    (2018) Swarnakantha, N.H.P. Ravi Supunya
    Attendance management is a very important task for each and every university or an institute. Most of institutes doing this attendance marking manually and it is time-consuming as well as it many causes to many errors. Therefore, r searchers tried to come up with automated attendance systems as a result of this issue. Researchers developed different systems using finger print technology, radio frequency identification (RFIO) and face recognition. Many of them used those technologies separately but it is not suitable for places like education in titutes. The purpose of the following research is to design and develop a new system using different technologies together and enable the internet of things to the system. So, this system uses face recognition and radio frequency identification t gether to come up with a proper solution. The system is using an online MySQL database to store entire data of the system. Python is used to program the system and Open CV is used for face recognition. One main finding of the research is to identify the student with different angles of face after getting the RFIO tag value. When getting attendance, the stude t should place his or her RFIO tag on the reader and then the system identifies the student with the tag value. The system then retrieves student's registration details and start compare student's face with sa$faces of that student. If the system identifies the student, then it checks for the subject's time slot to ensure that the student comes to the correct class. If all of them are correct, the system marks attendance for the student and sends a .notification email to the student so the student can know his or her attendance marked successfully for the class. There IS a web application also developed to register courses and subjects on the system and to view attendance details
  • Thumbnail Image
    PublicationOpen Access
    Analysis of Human Interpretability in Document Classification
    (2018) Kumari, P.K.Suriyaa
    With high use of computers, the collection of textual data generated, exchanged, stored and accessed increased in massive amount and became one of the richest sources of data for the organization. As a result, people are tending to use natural language processing application to categorize this large volume of data efficient and accurate manner. Their application of machine learning models. When it comes to Natural Language processing (NLP) applications where most of them follows supervised learning techniques, automatic document classification models developed to do content-based assignment here the materials are assigned into predefined categories. This makes it easier to find the relevant information at the right time and for filtering and routing documents directly to correct users. Mostly these learning models are operating in black-box manner wh re there is no way to interpret how the model has decided which class an instarce should assigned. understanding the reason behind how learning makes these redictions ~7 are very important to trust such learning models in real application. [his thesis presents the work related to the experimental work been carried with set of text classifiers to interpret text classifiers predictions, so any classifier can be evaluated based on how well they support classification purpose.
  • Thumbnail Image
    PublicationOpen Access
    Uncertainty factors of the projects in Sri Lank n software industry and a controlling model
    (2014) De Silva, Induneth
    Uncertainty is an inevitable factor of most software projects, not only in Sri Lanka but when considering the global software industry. Most Project Managers make decisions, milestones to make sure that each and every stakeholder in the project team is working to make the desired delivera les but still the project ends up with an overrun schedule, overflowing budget and compromised specifications. Or it just dies. Software organizations should identify different kind of uncertainties where project can tolerate at different stages of the projects. For this study I w uld like to collect data through questionnaires from several software companies in Sri Lanka and find out what are the uncertainties that they face during various phases of the project. Also the management approaches they take wh n such instance occurred will also identified from the data collection from vario s stake holders of the projects. ...;p,r;r In this study the uncertainty factors were explored by conducting surveys based on interviews and questionnaires. From the interview based surveys the uncertanty factors affecting to projects in Sri Lanka software indus y were identified and to measure the significance of the responses actions n each impact level a questionnaire based mass surveys was conducted.There it is observed that there are response actions that can be taken independent of the impact level of the uncertainty of some uncertainty factors. Furthermore when selecting suitable response action when there is an uncertainty in a particular impact level, the order of preference can be taken into consideration. This study is significant because the data was collected from a large sample of professionals who involved in Sri Lankan software industry and inferential analysis techniques and hypothesis tests were performed under 95% signi icance level and the tests satisfied the requirements of validity of the data. Als from the mass questionnaire-based survey verifies the application of responses ctions for identified uncertainties in different impact levels.
  • Thumbnail Image
    PublicationOpen Access
    Development of a Framework for Real- Time Business Intelligence for Managing Risk in Banking Industry
    (2014) Mahasivam, Pavithra
    There is no doubt that data management is a critical component of any financial se 'vices firm's risk management strategy in the current market climate. As financial strategies have become more complex, new financial instruments are added and businesses continue the r expansion across the globe, the need for a coherent and streamlined approach to data nanagement potentially including the use of real-time data has never been greater. As today's decisions in the business world have become more real-time, the systems that support those decisions need to keep up. It is only natural that Business Intelligence BI systems quickly begin to incorporate real-time data in order to increase risk transparency to make better and faster busines s decisions, evaluate and predict broader spectrum of risk scenarios, confidentially answer qi arries from regulatory bodies and internal stakeholders. Thisresearch is mainly focusing on risk management of banking industry. The resea 'ch delivers advanced analytics and reporting capabilities to help strategic decision makers for ns vigate data to identify new opportunities, manage and mitigate risks, and make fact-based ecisions in ~- timely manner. Every bank measure and monitor their performance against characteri tics which is known as Key Performance Indicators (KPls). KPIs help an organization define t re progress . towards the organization goals. Important KPls of bank are identified in the literature that is used by financial regulators to keep track of how well-protected a bank is against risk.The real-time business intelligence framework is emulated for the banking industry in order to mitigate risk. The framework consists of changed data capture (eDq routine and rule-based engine. eDe routine is used to capture the changed data from the source database and load it to data mart online real-time. The rule base engines identify pattern changes in the data, based on the defined parameters and provide advanced analytics and reporting capabilities.
  • Thumbnail Image
    PublicationOpen Access
    Opinion Mining and Sentiment Analysis, to Improve Legal Information Efficiency Analysis in Sri Lankan Legal cases
    (2014) Jayaweera, D.A.N.
    SriLanka Information Technology field is now growing faster and the other industries try to combine their work with Information Technology to gain more profit and publi ity. Sri Lanka law field is one of the most famous and oldest fields. Most of the industry field can combinewith Information Technology and do new things as an example store data analyzing data.They need to analyze data because of they need to get correct decision and decision making process. Current Lawyers in Sri Lanka, use manual way to store client details, organize their work etc. Because of that they need lots of document writings, document reading.When the new case acquire to Lawyer, they need to read all history cases and they needto analyze those cases and get the final decision. Searching documents, creating new case files, organize the documents they need to do in efficiency manner. I prop sed this systemto how to they analyze the legal cases opinion and mining legal cases. Opi ions are consequently important that whenever one needs to make a decision, one wants to hear others' opinions. This is true for both individuals and organizations. The technology of OpinionMining thus has a great scope for practical applications. The concept of opi ion is in thecontext of Sentiment Analysis, the main tasks of Sentiment Analysis, and the fr mework of opinion summarization. Along with them, two relevant and important concepts of subjectivityand emotion were also introduced.ewhich are highly related to but not e uivalent to opinion. Existing studies about them have mostly focused on their intersecti ns with opinion.I create a system to analyze legal information in proper manner. The researc is give designthe application in the world context 'and introduce interactive customizable application forthe purpose of analyze legal information. As the outcome of the research, it will present the statistics and survey outcomes of usage of the introducing application f r legal informationanalyze in Sri Lanka and make available the developing.
  • Thumbnail Image
    PublicationOpen Access
    Geospatiallntelligence on a graph
    (2014) Kanaka, Tharik
    Geographical Information Systems (GIS) bas being used oyer few decades across various organizations and also used by public in the day to da. for scenarios such as map representations, road navigation and Global Positi ning System (GPS) tracking. There are so many commercial and free GIS softw re is available out there for enterprises and also there are applications for per onal usage which are becoming very popular with increased usage of computer and mobile devices. On the other hand with the rapid increment computer systems usage and internet usage data is getting piled in exponentially. As a result of that concepts such as big data and NoSQL came to the picture in order to manipulate those data effectively. Graph databases arc one data model of NoSQL datab iscs which delivers significant advantages such as agility, flexibility and performance. Since geographic data is naturally structured like a graph, representing a GIS data in a graph structure can be useful for spatial index g, storage and topology in much effective way compared to other database type. There is a gap when representing organizational on maps whereas there are limitations when it comes to details. For an instance when restaurant cl ain company is representing their branch outlets on a map. They have to stick to basic set of attributes allowed by mapping service provider. Tbey can ot represent beyond that such as types of food they are selling and curr nt availability of them in' branch wise. This research will develop a implementation by combining these two technologies GIS and graph databases in order to achieve a central Geospatial intelligence on graph which livers benefits in the context of multiple data source integration and querying and analyzing them to generate new knowledge. In the implementation architecture a graph database stands in the back end and all the transactions are exposed and carried out by a managed Representational state transfer (REST) application programming interface (API) implementation. This API facility mak s the implementation as an interoperable platform which can be integrated with many other applications. Front end is implemented in Javascripr and mapping libraries which co ect to REST API backend and loads mapping information from a map engine. From the front end map routing and graph searching can be carried out. For graph results an optimal routing algorithm will be carried to for effective result s. At the end this research work outcome is a geospatial intelligence platform wl ich is implemented on a graph database.
  • Thumbnail Image
    PublicationOpen Access
    AnyDbMobileSync : Database Agnostic Synchronization Framework for Mobile Application
    (2014-12) Abeysingha Gunawardhana, Suminda
    Implement database independent data synchronization middleware framework (AnyDBMobileSync) for Server side SQL server/oracle database/my s Ietc. and client side any data store (HTML5 local store/websql/sqllite etc). If an offline mobile application used this middleware sync framework then their backend Database can change without mobile application extra development. Framework handled different database type (Sql server/oracle/my QL) that communicates mobile clients' offline data. Framework and Mobile Client communicate using Rest-full service. because of that mobile client-side doesn't need to install extra API. Communicate data object type is JSON and JSON can use any application language to e tract data from JSON object.
  • Thumbnail Image
    PublicationOpen Access
    An Approach towards Password Protection Based On Typing Style
    (2014-12) Arnarasena, Nelum Chathuranga
    The most common user authentication mechanism is password verification. other words, characterswhich types as text in a password field. However, the aim of this research is to find outwhether the rhythm and/or the style of typing; how types instead of what pes (Keystroke Dynamics), is sufficiently reliable as a security enhancement. This is a biometric approach. Biometric solutions are costly; requires at least one additional sensor. But this study focuses on an economical biometric solution that does not necessitate any additional sens r other than the keyboard.Keystroke dynamics is an interesting biometric because it always invisible for users, unlessthey are physically present, and also it is not depending on a dedicated device or hardware infrastructure. When a person is typing at a keyboard, the detailed timing information that describes exactly when each key was pressed and when it was released and va .ation of speed movingbetween two keys are continuously monitoring in order to recognizes a unique pattern. Thenanother pattern recognition part is operating in stealth mode with the passw rd verification. Thereforeafter the password is verified successfully, the pattern recognition part also needs to be completedin order to authenticate the user. Significance of this research is the way of generating and storing the pattern. As I explained thrgJ.,lghthe literature study keystroke dynamics is not a veryreliable biometric. So the challenge was to make a strong pattern which i hard to reveal usinga less reliable building block which I achieved successfully through this study.