Department of Computer Systems Engineering
Permanent URI for this collectionhttp://rda.sliit.lk:8081/handle/123456789/2697
Browse
4 results
Search Results
Publication Embargo Success Factors of Requirement Elicitation in the Field of Software Engineering(IEEE, 2022-12-09) Attanayaka, B; Nawinna, D; Manathunga, K; Abeygunawardhana, P. K. WRequirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requirements, difficulty meeting with relevant stakeholders, stakeholder resistance to change, and not enough time set aside for meetings with all stakeholders. The prime causes of software implementation failure have been identified as inadequacies in the treatment of requirements. Without collecting the quality requirement, cannot achieve the goal of a quality software product. Through identifying the success factors affecting requirement elicitation, the paths to the quality requirements can be identified. The success factors identify through this research are experience, business analyst skills, stakeholder relationship, organizational elicitation process. This study aims to identify the factors affecting requirement elicitation based on the data collected from business analysts and similar positions in the software industry through a survey, interviews, and analyzed data to provide the initial validation for the identified factors. Through the analysis, we identified the main factors affecting successful requirement elicitation with a perfect significance value of less than 0.05 for all factors.Publication Embargo AI-Based Child Care Parental Control System(IEEE, 2022-12-09) Jayasekara, U; Maniyangama, H; Vithana, K; Weerasinghe, T; Wijekoon, J; Panchendrarajan, RDue to the prevalence of the COVID-19 epidemic around the globe, children were compelled to engage in remote learning through online platforms, hence mobile phone has become one of their predominant devices. Mobile device with Internet access offers a major outlet for education, entertainment, and social connection, but this combination can lead to several significant bad sequences such as online exploitation, harmful addictions, and other negative impacts of online social networking. To address harmful effects, parental controls are becoming more crucial, yet Sri Lankan parents are less aware of this. Consequently, this study proposes a parental control system to monitor their child’s activities. Android, Microsoft Azure, Java, Python, OpenCV, MySQL, and FastAPI are among the most prominent technologies utilized in the proposed application’s development. The suggested approach focuses primarily on the Sri Lankan context and aims to enhance parental digital literacy while safeguarding children from cyber threats. Yielded results showed the proposed mobile application for the identification of toxic words, drugs & alcohol content, game character images, and Instagram Sinhala comments severity as 94%, 95%, 97%, and 55% respectively in controlled experiments.Publication Embargo Algorithmically Navigating Complex Tabular Structures in Images for Information Extraction(IEEE, 2022-12-26) Nugawela, M; Abeywardena, K. Y; Mahaadikara, HComputer vision has been in the forefront of automating workflows to replace manual repetitive tasks with convenience and accuracy. Recognizing text from images of commercial documents through optical character recognition (OCR) form the initial step of most such workflows where majority of their information are in the form of complex data structures such as tables and nested tables. Although OCR technology has evolved to effectively capture text from images, there is still room for improvement in recognizing complex data structures and extracting tabular data from images. This paper proposes an algorithmic approach based on keyword detection and the position of words relative to each other in order to recognize nested structures and successfully extract tabular data into a program and human readable format, which aims to take a different approach as opposed to using machine learning models or pre-defined templates for layout recognition. Furthermore, this approach is shown to yield successful results in correctly comprehending the layout and data of nested table structures in multiple rows in a table.Publication Embargo Blockchain-based Secure Environment for Electronic Health Records(IEEE, 2022-11-26) Jayasinghe, J. G. L. A; Shiranthaka, K. G. S.; Kavith, T; Jayasinghe, M. H. D. V.; Yapa Abeywardena, K; Yapa, KElectronic health records (EHRs) have become the de facto standard for storing patient data in hospitals because of the data technology revolution. Many hospitals use server-based systems to keep track of patient medical records, however, this limits the scalability of those systems because they require a lot of storage space. Interoperability and security and privacy concerns, as well as cyber-attacks on the centralized storage, are among the issues they are dealing with. Lab report downloads can be compromised by a poor authentication mechanism that can be easily shared with a third party. Highlighted issues will be addressed by the proposed system, a Blockchain-based private patient information management system. Using a distributed, immutable, and secure ledger, the solution promises efficient system access and retrieval. Consensus can be achieved without consuming a big amount of energy or causing network congestion thanks to an enhanced consensus technique. Because of their tight zero-knowledge requirement, near-perfect data interchange across many platforms is possible thanks to Non-Fungible Tokens, which encourage openness and immutability in the data flow. In addition, the proposed system uses a mix of a hybrid access control system and public key cryptography to ensure high levels of data protection. Additionally, it is a fantastic accomplishment when Lab Report Download Portal and the report generator for medical lab reports can be connected to the main system, which can dynamically modify the report template format with multi-factor authentication enabled. Know your customer verification is also used to authenticate the user to the system. Decentralizing the medical industry’s data storage, sharing, and record-keeping is the general goal of this solution; this method eliminates the need for paper records.
