Research Papers - Dept of Computer Systems Engineering
Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253
Browse
4 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Embargo Computer Vision Based Navigation Robot(IEEE, 2022-12-26) Haputhanthri, M; Himasha, C; Balasooriya, H; Herath, M; Rajapaksha, S; Harshanath, S.M.B.The majority of industrial environments and homewares need help when exploring unknown locations owing to a lack of understanding about the building structure and the various impediments that may be faced while transporting products from one spot to another. This is because there is a lack of knowledge about the building structure and the potential obstacles that may be encountered. This paper provides “Computer Vision-Based Navigation Robot” as a strategy for indoor navigation with optimal accessibility, usability, and security, decreasing issues that the user may encounter when traveling through indoor and outdoor areas with real-time monitoring of the most up to date IoT technology. The article is titled “Indoor Navigation with Optimal Accessibility, Usability, and Security.” This article proposes “Computer Vision-Based Navigation Robot” as a solution for interior navigation that provides optimum accessibility, usability, and security. This is done in order to tackle the issue that was presented before. Since the readers of this post include people who work in industry as well as physically challenged people who live alone, CVBN Robot takes object-based inputs from its surroundings. This is because the audience for this essay includes both groups of people. This study also covers a variety of methods for localization, sensors for the detection of obstacles, and a protocol for an Internet of Things connection between the server and the robot. This connection enables real-time position and status updates for the robot as it navigates a known but unknown interior environment. In addition, this study covers a variety of methods for localization, sensors for the detection of obstacles, and a protocol for an Internet of Things connection between the server and the robot.Publication Embargo Adding Common Sense to Robots by Completing the Incomplete Natural Language Instructions(IEEE, 2022-07-18) De Silva, G. W. M. H. P.; Rajapaksha, S; Jayawardena, CThis system is developed to identify and complete the human’s instructions or incomplete sentences given by a user as a command. It would facilitate the interaction between the human and mobile service robots. However, when humans give the instruction, there can be incompleteness or else missing the information related to the environment. That is because humans, generally based on common sense, depending on the environment. Then the human brain can complete all those incomplete sentences by using common sense knowledge. This paper itself introduced a model of a service robot who can compete with the given incomplete instructions, display the related sentences or words, and finally move to the related objects in the environment. First, it will consider and identify the objects in the environment and then consider the given natural language instruction by humans. As a first step of the approach, complete the incomplete sentences. Those sentences are coming as natural language instructions. By parsing it into as the frame can identify the related words by using the created model or can call as language model and here used some identify words from the human common sense also, then the service robot will learn about the commonsense knowledge automatically from the parsing sentences as a speaker. Considering all the parsing sentences, it calculates and measures the accuracy of this service robot model. Simply this is a commonsense reasoning model. The result of the provided solution can enable the robot model that works in a ROS environment to identify and automatically perform the tasks.Publication Embargo Behavior & Bio metric based Masquerade Detection Mobile Application(Springer, Cham, 2019-07-29) Chandrasekara, P; Abeywardana, H; Rajapaksha, S; Sanjeevan, pMobile phone has become an important asset when it comes to information security since it has become a virtual safe. However, to protect the information inside the mobile, the manufacturers use the technologies as password protection, face recognition or fingerprint protection. Nevertheless, it is clear that these security methods can be bypassed. That is when the urge of a post-authentication is coming to the surface. In order to protect the phone from an unauthorized or illegitimate user this method is proposed as a solution. The aim of the proposed solution is to detect the illegitimate user by monitoring the behavior of the user by four main parameters. They are: 1) Keystroke dynamics with a customized keyboard; 2) location detection; 3) voice recognition; 4) Application usage. In the initial state machine learning is used to train this mobile application with the authentic user’s behavior and they are stored in a central database. After the initial training period the application is monitoring the usage and comparing it with the already saved data of the user. Another unique feature of this is the prevention mechanism it executes when an illegitimate user is detected. Furthermore, this application is proposed as an inbuilt application in order to avoid the deletion of app or uninstallation of the app by the intruder. With this Application which is introduced as “AuthDNA” will help you to protect the sensitive information of your mobile device in a case of theft and bypassing of initial authentication.Publication Embargo Platform Independent Browser Forensic Tool for Advanced Analysis of Artifacts and Case Management(IEEE, 2021-12-09) Dissanayake, D; Rajakaruna, S; Ranasinghe, D; Wijesooriya, A; Jayakody, A; Rajapaksha, SA web browser is a major attack vector which cyber-criminals utilize to land in an environment. The evidence related to the malicious browsing activities can be found in the host which gives valuable information related to the case. These digital footprints involve history, cookies, bookmarks, saved credentials and downloads etc. This paper presents a sophisticated tool aiding the conventional manual investigation process from evidence collection to the final v e rdict b y a u tomating h u man dependent functions, resulting a fast and unbiased analysis of browser forensic artifacts. This tool states its unique value over the existing tools by working operating systems independently, collecting all browsing evidence including deleted artifacts and encrypted saved credentials, automatically analysing the reputation of the extracted evidence, integrating evidence collected from different web browsers into a single timeline, and correlating the adjacent distrustful events inside and outside the host. Eventually, this tool calculates a browsing reputation scorecard and creates a profile for the host, condensing the findings g a thered t h roughout the investigation. The paper presents another important methodology to predict the future browsing reputation score based on the past browsing patterns. Furthermore, multiple cases management feature and dashboard provide a concise overview of overall findings to the forensic investigator.
