Department of Computer Systems Engineering

Permanent URI for this collectionhttp://rda.sliit.lk:8081/handle/123456789/2697

Browse

Search Results

Now showing 1 - 5 of 5
  • Thumbnail Image
    PublicationEmbargo
    Success Factors of Requirement Elicitation in the Field of Software Engineering
    (IEEE, 2022-12-09) Attanayaka, B; Nawinna, D; Manathunga, K; Abeygunawardhana, P. K. W
    Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requirements, difficulty meeting with relevant stakeholders, stakeholder resistance to change, and not enough time set aside for meetings with all stakeholders. The prime causes of software implementation failure have been identified as inadequacies in the treatment of requirements. Without collecting the quality requirement, cannot achieve the goal of a quality software product. Through identifying the success factors affecting requirement elicitation, the paths to the quality requirements can be identified. The success factors identify through this research are experience, business analyst skills, stakeholder relationship, organizational elicitation process. This study aims to identify the factors affecting requirement elicitation based on the data collected from business analysts and similar positions in the software industry through a survey, interviews, and analyzed data to provide the initial validation for the identified factors. Through the analysis, we identified the main factors affecting successful requirement elicitation with a perfect significance value of less than 0.05 for all factors.
  • Thumbnail Image
    PublicationEmbargo
    AI-Based Child Care Parental Control System
    (IEEE, 2022-12-09) Jayasekara, U; Maniyangama, H; Vithana, K; Weerasinghe, T; Wijekoon, J; Panchendrarajan, R
    Due to the prevalence of the COVID-19 epidemic around the globe, children were compelled to engage in remote learning through online platforms, hence mobile phone has become one of their predominant devices. Mobile device with Internet access offers a major outlet for education, entertainment, and social connection, but this combination can lead to several significant bad sequences such as online exploitation, harmful addictions, and other negative impacts of online social networking. To address harmful effects, parental controls are becoming more crucial, yet Sri Lankan parents are less aware of this. Consequently, this study proposes a parental control system to monitor their child’s activities. Android, Microsoft Azure, Java, Python, OpenCV, MySQL, and FastAPI are among the most prominent technologies utilized in the proposed application’s development. The suggested approach focuses primarily on the Sri Lankan context and aims to enhance parental digital literacy while safeguarding children from cyber threats. Yielded results showed the proposed mobile application for the identification of toxic words, drugs & alcohol content, game character images, and Instagram Sinhala comments severity as 94%, 95%, 97%, and 55% respectively in controlled experiments.
  • Thumbnail Image
    PublicationEmbargo
    Algorithmically Navigating Complex Tabular Structures in Images for Information Extraction
    (IEEE, 2022-12-26) Nugawela, M; Abeywardena, K. Y; Mahaadikara, H
    Computer vision has been in the forefront of automating workflows to replace manual repetitive tasks with convenience and accuracy. Recognizing text from images of commercial documents through optical character recognition (OCR) form the initial step of most such workflows where majority of their information are in the form of complex data structures such as tables and nested tables. Although OCR technology has evolved to effectively capture text from images, there is still room for improvement in recognizing complex data structures and extracting tabular data from images. This paper proposes an algorithmic approach based on keyword detection and the position of words relative to each other in order to recognize nested structures and successfully extract tabular data into a program and human readable format, which aims to take a different approach as opposed to using machine learning models or pre-defined templates for layout recognition. Furthermore, this approach is shown to yield successful results in correctly comprehending the layout and data of nested table structures in multiple rows in a table.
  • Thumbnail Image
    PublicationEmbargo
    Blockchain-based Secure Environment for Electronic Health Records
    (IEEE, 2022-11-26) Jayasinghe, J. G. L. A; Shiranthaka, K. G. S.; Kavith, T; Jayasinghe, M. H. D. V.; Yapa Abeywardena, K; Yapa, K
    Electronic health records (EHRs) have become the de facto standard for storing patient data in hospitals because of the data technology revolution. Many hospitals use server-based systems to keep track of patient medical records, however, this limits the scalability of those systems because they require a lot of storage space. Interoperability and security and privacy concerns, as well as cyber-attacks on the centralized storage, are among the issues they are dealing with. Lab report downloads can be compromised by a poor authentication mechanism that can be easily shared with a third party. Highlighted issues will be addressed by the proposed system, a Blockchain-based private patient information management system. Using a distributed, immutable, and secure ledger, the solution promises efficient system access and retrieval. Consensus can be achieved without consuming a big amount of energy or causing network congestion thanks to an enhanced consensus technique. Because of their tight zero-knowledge requirement, near-perfect data interchange across many platforms is possible thanks to Non-Fungible Tokens, which encourage openness and immutability in the data flow. In addition, the proposed system uses a mix of a hybrid access control system and public key cryptography to ensure high levels of data protection. Additionally, it is a fantastic accomplishment when Lab Report Download Portal and the report generator for medical lab reports can be connected to the main system, which can dynamically modify the report template format with multi-factor authentication enabled. Know your customer verification is also used to authenticate the user to the system. Decentralizing the medical industry’s data storage, sharing, and record-keeping is the general goal of this solution; this method eliminates the need for paper records.
  • Thumbnail Image
    PublicationEmbargo
    Identifying Objects with related Angles using Vision-based System integrated with Service Robots
    (2022) Lakshan, K.K. Pasindu
    Manipulation an object can be done with the collaboration of a human to a robot by introducing the object in a proper way. To do this in an easy way, we can model the object inside the robot head and add some sensors and cameras to identify the specific object. But when it comes to the real world, we cannot model all the objects in the world inside a robot head. If we can manipulate every object there can be more work would have done by the robots in efficient way. This research will present a strategy to identify the unknown objects using a visionbased system and with the perspective angles of the detected object and the system is integrated with service robots. This will go in a way when the robot should be able to identify the objects around the robot in an asynchronous manner with rotational angles and the pitch and roll angles, perspective to the robot standing surface. The research will be based on Artificial intelligence, Machine learning, and Robotics. Robotics operating system is used for simulating the robots and identification. For the identification process, a few ways can be used. Vision-based identification using color and depth images from an RGB camera, and this research is mainly based on this RGB, and depth feature integrated with YoloV5. And there are some other ways to identify objects like using a 3D-LiDAR laser scanner. However, this learning process, should have a stable object to model and train the object. After the object recognition, by using the proposed methodology robots can calculate and estimate the angles of the detected object. After the acquisition, the robot should be able to identify the object any time when it sees the object. Since this is a robot, we can use this to model unknown objects and retrieve the data from its database and manually name them if there is no one to name it in the time being