Research Papers - Dept of Computer Systems Engineering
Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253
Browse
11 results
Search Results
Publication Embargo Tempcache: A Database Optimization Algorithm for Real-Time Data Handling in Indoor Spatial Environments(IEEE, 2018-08-08) Jayakody, A; Murray, I; Hermann, J; Lokuliyana, S; Dunuwila, V. RThe unstable arrangement of modern indoor environments has made navigation within buildings a difficult task. Hence, this paper introduces the AccessBIM framework, which is an efficient real-time indoor navigation system that facilitates in generating a real-time indoor map by crowdsourcing spatial data through the sensors available in mobile devices of navigators. The framework is equipped with a database optimization algorithm known as “Tempcache” which reduces the time and cost of searching data by examining the AccessBIM database for previously navigated paths, thus enabling faster data retrieval through efficient query processing. A simulation of a virtual environment similar to an actual indoor environment was used to test the algorithm. The significance of the algorithm was validated by comparing the total map generation time before and after the algorithm was applied for which the results demonstrated a reduction in map generation time with the use of the algorithm. The framework is also capable of capturing localization information with the support of i-Beacons which is then stored in a cloud server.Publication Embargo Database modelling for vision impaired indoor navigation systems(IEEE, 2015-08-24) Jayakody, A; Murray, I; Herrmann, JCooperative research has been conducted to improve navigation services for vision impaired when they are moving through an indoor environment. Hence, to facilitate vision impaired individual in indoor environment requires a formal modelling approach for map generation and decision making about navigation pathways avoiding obstacles. The proposed data model consists "AccessBIM" database (DB) and API functions. The "AccessBIM" features such as, database connection initiation, function call, function return and database connection termination are organized as a series of function objects that meet the various needs of the database to maintain the relational schema. The proposed API primarily consists of two components, namely; DB connector and the API functions. Proposed "AccessBIM" DB will be implemented using real-time database such as "PostgreSQL". The weighted focus will be given to the areas such as Queries, Indexes and Transactions in relation to tuning the DB and the queries. The performance of the proposed API will be evaluated based on the time required to parse and Data insert rate and retrieval rates.Publication Embargo An algorithm for labeling topological maps to represent point of interest for vision impaired navigation(IEEE, 2015-10-13) Jayakody, A; Murray, I; Herrmann, JNavigation in indoor environments is highly challenging for both vision impaired and sighted people, particularly in unknown environments visited for the first time. Several solutions have been implemented and proposed to deal with this challenge. Although some of them have shown to be useful in real scenarios, each solution involves a significant deployment effort or describes objects in a manner that is unfamiliar or incomprehensible to an individual with severe blindness. This paper presents a model of adding informational point of interest to the typical indoor topological map; with particular attention to the semantic labels of the different type of indoor places and proposes a simple way to include the tags to build the topological map. Using this POI and the semantic information, the system determines the user's path, locates possible obstacles on that route, and offers navigation information to assist vision impaired navigation.Publication Embargo A database optimization model with quantitative benchmark(IEEE, 2016-03-11) Murray, I; Jayakody, A; Herrmann, J; Lokuliyana, S; Kandawala, D. S. A; Nanayakkara, S. E. CQuery optimization and indexing have an immense impact on database optimization. This has been considered in many different perspectives which provide several different solutions in each case. The purpose of this paper is to primarily provide a comprehensive review and discussion of the core problems through the research on query optimization technology and indexing, based on a number of optimization techniques commonly used in the general approach of a query. A new database optimization model is designed and experiments show that this model can significantly reduce the amount of query execution time to improve the optimization efficiency. Regardless of research on the database optimization model, significant work has been done to comparatively evaluate three scenarios; non-optimized query, optimized query without following any optimization standard, and optimized query via proposed optimization model using the same experimental methodology. Further, this paper describes a benchmark that was developed specifically for the purpose of measuring the quantitative evaluations of the proposed database optimization model.Publication Embargo Enhanced algorithmic implementation to assist real-time indoor map generation for vision impaired individuals(IEEE, 2018-08-08) Jayakody, A; Murray, I; Hermann, J; Lokuliyana, S; Dunuwila, V. RThe complexity of indoor environments has made navigation difficult for vision impaired individuals as well as individuals with clear vision. Although handheld mobility devices have been developed to assist the vision impaired in navigation, they are incapable of capturing parameters such as distance, angle and direction. This paper presents an appraised framework; the Accessible Building Information Model (AccessBIM), which could be used for generating an indoor map in real-time with the classification of real world objects and their locations. The AccessBIM database is equipped with two optimization algorithms; a database optimization algorithm that reduces the time of query execution through indexing, query re-writing, schema redesigning and a memory optimization algorithm known as “Memcache”. Five scenarios were tested using a simulator to determine the accuracy of the map that is generated. The use of the two algorithms ensured that the real-time map generated through the data collected from the simulation environment was similar to the actual floor plan. Hence, it can be concluded that the AccessBIM framework has the potential to play an integral role in assistive technologies related to localization and mapping, thus significantly improving the quality of life for individuals with vision impairment.Publication Embargo The construction of an indoor floor plan using a smartphone for future usage of blind indoor navigation(IEEE, 2014-11-27) Jayakody, A; Murray, IMost blind people require assistance to navigate within unfamiliar environments as there is often insufficient information about the buildings available to them. To address aspects of this problem, this paper describes the “AccessBIM” model as an approach to facility management in which a digital representation of the indoor building features is used to facilitate the exchange and interoperability of real-time information in digital format which can assist blind people to independently access unfamiliar building indoor environments. The model driven architecture that can be implemented for way finding and data synchronization, generating, in real-time topological map, to assist vision impaired individuals to navigate known and unknown indoor environment.Publication Embargo SDN based security solution for legislative email communications: Safe guarding communication(IEEE, 2016-04-29) Rupasinghe, L; Kulatunga, K. M. D.S. B; Murray, I; Keseva, KCommunication plays a major role in the day to day activities of the world. Communication can be a gesture, phone call or by e-mail. This why most of the governments pay more attention to communication patterns and what people communicate with each other. In modern day information technology plays a major role in private and public sector events. It's better to be having implement security in to the major aspects of these events, like encrypted commendation channels. Software Defined Network (SDN) based encryption solution will be a advantage to the organizations so that they do not need to invest more on deploying new physical servers and implement high end encryption techniques.Publication Embargo Trustworthy provenance framework for document workflow provenance(IEEE, 2016-03-11) Rupasinghe, L; Weerasena, H. H; Murray, IDocument workflows, which plays a major role in enterprise business process automation, are dynamic and prone to be changed over time. Assuring the provenance of these workflows is important when comes to quality, long term preservation, forensics and regulatory compliance. This research introduces a Provenance Framework for collecting workflow provenance data, storing them in documents as metadata securely and querying stored provenance data. The author uses the concept of making data objects independent and consider provenance data as intrinsic property of the data object, to support long term preservation of documents with provenance and to maintain the link between the data object and its provenance in cloud over time. Provenance data modeling and representation is done according to the W3C PROV Model. XMP framework is used to store and query provenance data as metadata in documents. Document signatures and metadata encryption is used to ensure security of provenance data.Publication Embargo A new elliptic curve cryptographic system over the finite fields(IEEE, 2017-01-27) Priyatharsan, U; Rupasinghe, L; Murray, ISecurity of the information is the main problem in network communications nowadays. There is no algorithm which ensures the one hundred percent reliability of the transmissions. The current society uses the Internet, to exchange information such as from private images to financial data. The cryptographic systems are the mechanisms developed to protect and hide the information from intruders. However, advancing technology is also used by intruders to breach the security of the systems. Hence, every time cryptosystems developed based on complex Mathematics. Elliptic curve cryptography(ECC) is one of the technique in such kind of cryptosystems. Security of the elliptic curves lies in hardness of solving the discrete logarithms problems. In this research, a new cryptographic system is built by using the elliptic curve cryptography based on square matrices to achieve a secure communication between two parties. First, an invertible matrix is chosen arbitrarily in the the field used in the system. Then, by using the Cayley Hamilton theorem, private key matrices are generated for both parties. Next, public key vectors of the both parties are generated by using the private keys of them and arbitrary points of the given elliptic curve. Diffie Hellman protocol is used to authenticate the key exchange. ElGamal plus Menezes Qu Vanstone encryption protocols are used to encrypt the messages. MATLAB R2015a is used to implement and test the proper functioning of the built cryptosystem.Publication Embargo A new elliptic curve cryptographic system over the finite fields(IEEE, 2017-01-27) Priyatharsan, U; Rupasinghe, L; Murray, ISecurity of the information is the main problem in network communications nowadays. There is no algorithm which ensures the one hundred percent reliability of the transmissions. The current society uses the Internet, to exchange information such as from private images to financial data. The cryptographic systems are the mechanisms developed to protect and hide the information from intruders. However, advancing technology is also used by intruders to breach the security of the systems. Hence, every time cryptosystems developed based on complex Mathematics. Elliptic curve cryptography(ECC) is one of the technique in such kind of cryptosystems. Security of the elliptic curves lies in hardness of solving the discrete logarithms problems. In this research, a new cryptographic system is built by using the elliptic curve cryptography based on square matrices to achieve a secure communication between two parties. First, an invertible matrix is chosen arbitrarily in the the field used in the system. Then, by using the Cayley Hamilton theorem, private key matrices are generated for both parties. Next, public key vectors of the both parties are generated by using the private keys of them and arbitrary points of the given elliptic curve. Diffie Hellman protocol is used to authenticate the key exchange. ElGamal plus Menezes Qu Vanstone encryption protocols are used to encrypt the messages. MATLAB R2015a is used to implement and test the proper functioning of the built cryptosystem.
