Research Papers - Dept of Computer Systems Engineering

Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253

Browse

Search Results

Now showing 1 - 10 of 55
  • Thumbnail Image
    PublicationEmbargo
    Image Enhancement Algorithm for Remote Surveillance Using Low Cost Cameras in Unevenly Illuminated Environments
    (IEEE, 2021-12-07) Dharmasena, T; Abeygunawardhana, P. K. W
    The surveillance domain is becoming increasingly popular due to the demand for security and safety. In terms of the data being used, the cameras linked to them play an essential role. However, in poorly lit environments, the acquired image may appear to be underexposed when the camera adjusts itself to the light available in the scene, resulting in a loss of visual information in poorly lit regions. This could result in poor functionality in image based processing, as well as a negative impact on remote surveillance monitoring activities. This study offers a novel algorithm for improving the illumination of scenes that are unevenly lit using a selective pixels processing method to enhance the illumination of the environment. Rather than processing grayscale versions of red,green and blue channels to enhance the image, this approach uses value (v) channel of an HSV image.
  • Thumbnail Image
    PublicationEmbargo
    Analysis of Searching Algorithms in Solving Modern Engineering Problems
    (IEEE, 2021-08-11) Rathnayake, B. R. M. S. R. B.; Marzuk, H; Senadheera, R. I. A; Vijeyakumar, S; Abeygunawardhana, P. K. W
    Many current engineering problems have been solved using artificial intelligence search algorithms. To conduct this research, we selected certain key algorithms that have served as the foundation for many other algorithms present today. This article exhibits and discusses the practical applications of A*, Breadth-First Search, Greedy, and Depth-First Search algorithms. We looked at several recent research publications on these algorithms (for example, maze solver robots, the eight-puzzle problem, medication prediction, and travel advice) and critically examined their benefits, drawbacks, and challenges. We’ve also done some experimentation with a Python application to see how well these algorithms perform.
  • Thumbnail Image
    PublicationEmbargo
    Code Vulnerability Identification and Code Improvement using Advanced Machine Learning
    (IEEE, 2019-12-05) Ruggahakotuwa, L; Rupasinghe, L; Abeygunawardhana, P. K. W
    Cyber-attacks are fairly mundane. The misconfigurations of the source code can result in security vulnerabilities that potentially encourage the attackers to exploit them and compromise the system. This paper aims to discover various mechanisms of automating the detection and correction of vulnerabilities in source code. Usage of static and dynamic analysis, various machine learning, deep learning, and neural network techniques will enhance the automation of detecting and correcting processes. This paper systematically presents the various methods and research efforts of detecting vulnerabilities in the source code, starting with what is a software vulnerability and what kind of exploitation, existing vulnerability detection methods, correction methods and efforts of best researches in the world relevant to the research area. A plugin will be developed which is capable of intelligently and efficiently detecting the vulnerable source code segment and correcting the source code accurately in the development stage.
  • Thumbnail Image
    PublicationEmbargo
    Effective use of network device state information for network path selection
    (IEEE, 2017-01-27) Wijekoon, J; Abeygunawardhana, P. K. W
    Network path selection defines the methodology of selecting the best routes and forwarding traffic in a network service provider (NSP). NSPs use routing protocols that are optimized for a single arbitrary metric (i.e., administrative weight), which is commonly calculated according to the link state information, to select network paths. Despite the advantages, link-state protocols lack the ability to select network paths by considering the states of network devices such as the effect of routers for network path selection. Apparently, studying possible techniques for selecting network paths based on the state information of network devices, e.g., routers, has become obligatory. This paper hypothesis to calculate a composite path selection metric by employing the state information of network devices; the proposed method selects the network paths based on the cumulative packet traveling time. By simulating proposed method using an ISP topology, the proposed method is examined for the effectiveness of using network device state information for network path selection.
  • Thumbnail Image
    PublicationEmbargo
    An adaptive routing algorithm for Cognitive Packet Network infrastructure based on neural networks
    (IEEE, 2011-08-16) Madubashitha, D. K. D; Wijesinghe, W. M. S. S; Kamaladiwela, K. A. S. R; Ranaweera, M. G. P; Wijekoon, J; Abeygunawardhana, P. K. W
    This paper examines the possibility of introducing an intelligent routing protocol to the Internet, based on the Cognitive Packet Network (CPN) architecture with respect to the Quality of Service (QoS) delivered to the end users. In the present with increasing populations of countries it is clear that present infrastructure does not hold the sufficient capacity to deliver the expected level of service to the end users. Since there is an eminent need for a solution for improving the QoS in the Internet, this research focuses to provide a new network architecture which would improve the QoS, provide reliable and efficient service which can fulfill the ever growing Internet usage demand. This is achieved through a new network architecture known as CPN which is based on the basis of providing the best and user desired QoS. The main underlying technology behind the CPN will be a neural network. The neural network will be learning the changes in the network and adapt to the situation through the knowledge gathered. The packets will collectively learn about the network thus the load on the routers will be minimized. This mechanism completely replaces the need of a routing table thus making routing far more efficient when comparing to current routing protocols like Open Shortest Path First (OSPF). Final outcome of the research is coming to the conclusion that the future of the Internet is with the neural network based intelligent, dynamically adapting and learning CPN infrastructure instead of current packet switched network.
  • Thumbnail Image
    PublicationEmbargo
    Casterless Wheelchair Robot Using Inverted Pendulum Control
    (IEEE, 2006-08-08) Abeygunawardhana, P. K. W; Toshiyuki, M
    Power assist wheelchair robot is playing a key role in the field of medical welfare robotics. But, to a certain extend, there is a setback in development due to presence of caster wheels. Hence, this paper proposes a casterless wheelchair and its control on a straight line path. That is, straight line driving of two wheel power assist wheelchair robot was proposed in this paper while keeping stability of wheelchair body itself. Balancing of wheelchair body is proposed to achieve by controlling the inverted pendulum mounted on the wheelchair. Control equations of the system are derived using Lagrange equation of motion. Two separate controllers are designed for two wheels. In addition to these two controllers, there is another controller for pendulum. Body controller is designed combining pendulum controller and wheel controller. Disturbance observer is used to cancel disturbance effects. Simulation was carried out to prove the applicability of the proposed system
  • Thumbnail Image
    PublicationEmbargo
    An Empirical Study on Slow and Limited Adoption of Internet Banking By Sri Lankan Customers
    (IEEE, 2011-08-16) Abeygunawardhana, P. K. W; Weerasekara, S
    Usage of internet is rapidly increasing in Sri Lanka. However, usage of internet banking is very slow compared to increase of internet users. This study will focus on four main possible areas which may effect to slow adaptation of Internet Banking as Awareness & Knowledge of Internet Banking, Perceived Characteristics of Internet Banking, Consumer Resistance to Change, Legal Support and IS Security. Based on the data gathered, these 4 conditions are tested using statically analysis method.
  • Thumbnail Image
    PublicationEmbargo
    Precision Controlled Variable Phase Filter for Imaging Type Two-Dimensional Spectroscopic Tomography
    (IEEE, 2013-09-01) Abeygunawardhana, P. K. W; Suzuki, S; Ishimaru, I; Nishiyama, A
    Spectroscopic measurement is being widely used for non-invasive blood sugar measurement in recent past. Imaging type two-dimensional spectroscopic tomography has been designed using wave front division interferometer. Variable phase filter, which has fixed mirror and movable mirror, has been used to introduce the phase shift between rays. Capability of measuring biogenic substances using this method has been proved. Variable phase filter has a piezoelectric actuator which has the stroke of 30μm. However, it is not enough for mid-infrared application. Smooth Impact drive mechanism with longer stroke was used here. However, smooth control is challengeable. This paper proposed the control of SIDM using PID control and Pseudo inverse differentiation. Proposed controller implemented and experiment result proved the effectiveness of proposed method.
  • Thumbnail Image
    PublicationEmbargo
    Compact optical system for imaging type two-dimensional spectroscopic tomography
    (IEEE, 2013-12-17) Abeygunawardhana, P. K. W; Nakada, S; Suzuki, S; Nishiyama, A; Ishimaru, I
    Spectroscopic measurement is being widely used for non-invasive blood sugar measurement in recent past. Imaging type two-dimensional spectroscopic tomography has been designed using wave front division interferometer. Variable phase filter, which has fixed mirror and movable mirror, has been used to introduce the phase shift between rays. Capability of measuring biogenic substances using this method has been proved. For the quantitative analysis with high accuracy, the correction of the background such as the light-source fluctuation and the phase-shift uncertainty is inevitable issue. Background noises and vibrations in test bed are part of the causes that could results such errors. This paper proposes a new closed optical system to improve the system performance. One-shot type spectroscopic tomography and Smooth Impact Drive Mechanism are used here.
  • Thumbnail Image
    PublicationOpen Access
    Neural Network Based Routing Algorithm for Cognitive Packet Network Architecture
    (http://inpressco.com/category/ijcet, 2014-02-01) Abeygunawardhana, P. K. W
    This journal focuses on introducing an adaptive routing algorithm to be used on Wide Area Network(WAN) like Internet, based on the Cognitive Packet Network (CPN) architecture to enhance the Quality of Service (QoS) delivered to the end users. This research focuses on Building on top of the CPN network architecture and introducing a neural network based routing algorithm which would improve the QoS, provide reliable and efficient service which can fulfill the ever growing Internet usage demand. The neural network’s task would be learning the network and adapt to any situation through the knowledge gathered. The packets will collectively learn about the network thus the load on the routers will be minimized. This mechanism completely replaces traditional method of routing tables which results in efficient and reliable packet delivery in comparison to current routing protocols like Open Shortest Path First (OSPF). This research has introduced a routing algorithm which is Intelligent, dynamically adapting and self-learning for CPN infrastructure instead of current packet switched network.