Research Papers - Dept of Information Technology
Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/593
Browse
2 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Embargo Techniques of Enhancing Synchronization Efficiency of Distributed Real Time Operating Systems(IEEE, 2022-02-23) Rajapaksha, S; Alagalla, HDistributed Operating Systems is one of the most modernizing concepts of the world. When it comes to Distributed Networks and Operating Systems, Real-Time Operating systems are highly crucial for the developers to achieve desired Tasks. To make the concept into the working functionality, Synchronization is playing a huge role. Synchronization has experimented with many techniques by researchers. Still, there is a lack of analysis to find the most optimized and most effective technique to achieve the goal of enhancing the accuracy and efficiency of Real-Time Operating Systems (RTOS) by synchronization context. Apart from that research is analytically produces the explanation about existing synchronization platforms in the computing world including backup Synchronization, On-Chip Memory Handling, Location-Based Network Systems Configuration, and Hardware Oriented Synchronization. Especially this research focuses on the problems and challenges of the existing RTOS and Distributed RTOS (DRTOS) Systems. Further, this paper will elaborate on the best-suited solutions and techniques to follow during the development of Distributed Node Network with Multi-Core Processors. It will propose multiple techniques to enhance the efficiency by using various algorithms comprising lock-based, lock-free, semaphore based, Mutex based, and Hardware related high accuracy criteria. Also, this will be highly beneficial for the people who are interested in Internet of Thing-based Distributed Networks to build more supportive and high-performance processing systems using desired featured objectives.Publication Embargo Enhancing the security of online banking systems via keystroke dynamics(IEEE, 2013-04-26) Gunathilake, N. M; Padikaraarachchi, A. P. B; Koralagoda, S. P; Jayasundara, M. G; Paliyawadana, P. A. I. M; Manawadu, C. D; Rajapaksha, S. KSecurity is one of the key components of a computer system. The critical aspects become higher when it comes to online solutions that have millions of secure transactions occurring. Once the user credentials are passed to unintended user, the security of that particular entity is vulnerable harmful events could occur in different magnitudes. What is required is a reliable, efficient and hardware independent solution to authenticate online systems from intruders and hackers. In our research we have provided evidence that a complete platform independent online solution based on a methodology called Keystroke Dynamics which extract detailing timing information of user, and create a bio-matric template for each can be used to handle these treats. Comparing with other existing method this is more productive and efficient manner to authenticate online systems.
