Research Papers - Dept of Information Technology
Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/593
Browse
4 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Embargo Analyzing Fisheries Market, Shrimp Farming & Identifying Fish Species using Image Processing(IEEE, 2022-12-09) Sumeera, S; Pesala, N; Thilani, M; Gamage, A; Bandara, PThe fisheries industry is vital to the Sri Lankan economy because it provides a living for more than 2.5 million coastal communities and meets more than half of the country’s animal protein needs. Today, the fishery community in Sri Lanka is facing several grant problems. Among them, not getting a decent fish price for their harvesting, the inability to identify diseases in shrimp cages in the early stages, and the inability to identify fish species by observing their external appearance. This research developed a prototype mobile application “Malu Malu” to avoid the above-mentioned problems. It facilitates to the prediction of market fish prices, identifying shrimp diseases in their early stages, and identifying fish species by observing their external appearance. The proposed predictive models of the “Malu Malu” contains three main models developed using inseption V3 Convolutional Neural Network (CNN) model for image classification and Linear Regression is used for creating a model for predictions. The experimental results of these models showed above 85% of accuracy.Publication Embargo Development of Agent-Based Centralized Tool For Analyzing and Managing Security-Enhanced Linux Policies using WebSocket Protocol(IEEE, 2022-02-23) Rajapaksha, S; Kularatna, I. MThe SELinux facilitates and includes an extensible "MAC" structure built within the Linux kernel. An application or a process life cycle that runs as a user has the specific authority to access objects such as files, sockets, and other processes with Linux’s default Discretionary Access Control (DAC). SELinux prescribes the access and the progress privileges of each user, application, process, and the files on the system and administers the communications of these elements utilizing a security strategy that determines how severe or indulgent a given Red Hat Enterprise Linux establishment ought to be. However, its constraints such as, not being user-friendly, having too complicated policies, and complex policy description language, are limiting the implementation of SELinux policies in the Information Technology industry. As a result, there is only a little research available on User Interface-based policy management tools. Even those researches have limitations such as the inability to remotely manage a host/server, manual documentation, and the inability to monitor the systems automatically from a dashboard. In order to overcome said research gap and problems, this research will implement a system using a web-socket technology that facilitates the ability to converse in full-duplex through just one TCP connection. This system is included with a web socket-agent, which can be installed in server endpoints and can change SELinux policies, a web-socket server: which can do live communication with the agent to perform policy changes along with the UI component: to manage policies using the user interface and a database component to store policy details.Publication Embargo Development of Agent-Based Centralized Tool For Analyzing and Managing Security-Enhanced Linux Policies using WebSocket Protocol(IEEE, 2022-04-14) Kularatna, I. M; Rajapaksha, SThe SELinux facilitates and includes an extensible "MAC" structure built within the Linux kernel. An application or a process life cycle that runs as a user has the specific authority to access objects such as files, sockets, and other processes with Linux’s default Discretionary Access Control (DAC). SELinux prescribes the access and the progress privileges of each user, application, process, and the files on the system and administers the communications of these elements utilizing a security strategy that determines how severe or indulgent a given Red Hat Enterprise Linux establishment ought to be. However, its constraints such as, not being user-friendly, having too complicated policies, and complex policy description language, are limiting the implementation of SELinux policies in the Information Technology industry. As a result, there is only a little research available on User Interface-based policy management tools. Even those researches have limitations such as the inability to remotely manage a host/server, manual documentation, and the inability to monitor the systems automatically from a dashboard. In order to overcome said research gap and problems, this research will implement a system using a web-socket technology that facilitates the ability to converse in full-duplex through just one TCP connection. This system is included with a web socket-agent, which can be installed in server endpoints and can change SELinux policies, a web-socket server: which can do live communication with the agent to perform policy changes along with the UI component: to manage policies using the user interface and a database component to store policy details.Publication Embargo Analyzing transport layer protocols to create an API to satisfy timed response in dynamic requirements of wireless networks(IEEE, 2014-12-11) De Silva, D. H; Ahamed Ishak, M. M; De Silva, G. C. M; Suranjith, A. V. S; Herath, H. M. H. SIn modern systems it is very vital to have an efficient data transmission mechanism. This becomes more critical factor when it is involved with a system like a way finding application for vision impaired people or a medical system that notifies the doctor's smartphone when the patient's heart rate goes down. The size of the data that is used frequently by the mentioned systems is relatively small. Additionally it might take more time for connection establishment despite of the requirement of urgency. Thus this kind of data transmission is not ideal for such systems. Therefore this diversity of data transmission makes a special category of systems that needs a reliable, efficient data transfer mechanism since requirements of those systems such as low latency, reliability are not being fully satisfied by the current Transport Layer Protocol (TLP) selection mechanism.
