1st International Conference on Advancements in Computing [ICAC] 2019
Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/1599
Browse
Publication Embargo AI Based Cyber Threats and Vulnerability Detection, Prevention and Prediction System(IEEE, 2019-12-05) Amarasinghe, A. M. S. N; Wijesinghe, W. A. C. H; Nirmana, D. L. A; Jayakody, A; Priyankara, A. M. SSecurity of the computer systems is the most important factor for single users and businesses, because an attack on a system can cause data loss and considerable harm to the businesses. Due to the increment of the range of the cyber-attacks, anti-virus scanners cannot fulfil the need for protection. Hence, the increment of the skill level that required for the development of cyber threats and the availability of the attacking tools on the internet, the need for Artificial Intelligence-based systems, is a must to the users. The proposed approach is an automated system that consists of a mechanism to deploy vulnerabilities and a rich database with known vulnerabilities. The Convolutional Neural Networks detects the vulnerabilities and the artificial intelligence-based generative models do the prevention process and improves reliability. The prediction procedure implemented using the algorithm called “Time Series” and the model called “SARIMA”. These implementations give an output with considerable accuracy.Publication Embargo AI Based Depression and Suicide Prevention System(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Kulasinghe, S.A.S.A.; Jayasinghe, A.; Rathnayaka, R.M.A.; Karunarathne, P.B.M.M.D.; Silva, P.D.S.; Anuradha Jayakodi, J.A.D.C.Suicide is a major issue in the world. The number one reason for suicide is untreated depression. That is why it was decided to focus on depression symptoms more and identify them in order to prevent suicidal attempts. To cure depression, the best way is to talk about their feelings with someone they trusted and release their pain inside of them. Because of that this system has a Chat-bot for the user to interact with. Chat-bot will gather information about the users feelings through text and voice analysis. Also by analyzing their Facebook statuses and recent web history, the application gather more information about their mental state so that the system take more accurate conclusions. After analyzing all the information from each component the back brain will decide on how the chat-bot should act on the user. At the end, the product was able to give more than 75% accurate results for each component.Publication Embargo Air Visio: Air Quality Monitoring and Analysis Based Predictive System(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Dissanayaka, A.D.; Taniya, W.A.D.; De Silva, B.P.A.N.; Senarathne, A.N.; Wijesiri, M.P.M.; Kahandawaarachchi, K.A.D.C.P.Sri Lanka is facing a serious air pollution problem that severely impacts the daily life of every Sri Lankan. The main source of ambient air pollution in Sri Lanka is vehicular emissions. A methodology to monitor the air quality in real-time with an overall coverage of Sri Lanka, and automatically process these huge data to identify air quality levels in a specific area is now becoming a timely research topic. An air quality monitoring and analysis based predictive system is proposed to monitor the ambient air quality, provides the best route with minimum polluted air, maps the heatmaps to identify the current air quality of an area easily and predict the future air quality of each area. The prototype was implemented by hierarchically deploying two different gas sensors, an Arduino Uno board and a wifi module, to implement in open spaces between smart buildings, and transfers the sensor data back to the information processing center by using IoT technology for real-time display. The information processing center stores real-time information which is collected from the sensors to the database. By reading sensor data stored in the database, the front-end system draws real-time, accurate air quality levels included maps and predicts the less polluted routes and the air quality level over an area. Further, an energy harvesting system is also presented for the power consumption of the device. A route is suggested in an accuracy of 70% from this system. The final product provides a low cost, highly portable and easily maintainable system for the users.Publication Embargo Air Visio: Air Quality Monitoring and Analysis Based Predictive System(IEEE, 2019-12-05) Dissanayaka, A. D; Taniya, W. A. D; De Silva, B. P. A. N; Senarathne, A. N; Wijesiri, M. P. M; Kahandawaarachchi, K. A. D. C. PSri Lanka is facing a serious air pollution problem that severely impacts the daily life of every Sri Lankan. The main source of ambient air pollution in Sri Lanka is vehicular emissions. A methodology to monitor the air quality in real-time with an overall coverage of Sri Lanka, and automatically process these huge data to identify air quality levels in a specific area is now becoming a timely research topic. An air quality monitoring and analysis based predictive system is proposed to monitor the ambient air quality, provides the best route with minimum polluted air, maps the heatmaps to identify the current air quality of an area easily and predict the future air quality of each area. The prototype was implemented by hierarchically deploying two different gas sensors, an Arduino Uno board and a wifi module, to implement in open spaces between smart buildings, and transfers the sensor data back to the information processing center by using IoT technology for real-time display. The information processing center stores real-time information which is collected from the sensors to the database. By reading sensor data stored in the database, the front-end system draws real-time, accurate air quality levels included maps and predicts the less polluted routes and the air quality level over an area. Further, an energy harvesting system is also presented for the power consumption of the device. A route is suggested in an accuracy of 70% from this system. The final product provides a low cost, highly portable and easily maintainable system for the users.Publication Embargo Analyzing Payment Behaviors And Introducing An Optimal Credit Limit(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Bandara, H.M.M.T.; Samarasinghe, D.P.; Manchanayake, S.M.A.M.Identifying an optimal credit limit plays a vital role in telecommunication industry as the credit limit given to customers is influence on the market, revenue stabilization and customer retention. Most of the time service providers offer a fixed credit limit for customers which may cause customer dissatisfaction and loss of potential revenue. Therefore, it is essential to determine an optimal credit limit that maintains customer satisfaction while stabilizing the company revenue. Clustering algorithms were used to group customers with similar payment and usage behaviors. Then the optimal credit limit derived for each cluster is applicable to all the customers within the cluster. In order to identify the most suitable clustering algorithm, cluster validation statistics namely, Silhouette and Dunn indexes were used in this research. Based on the scores generated from these statistics KMeans algorithm was chosen. Furthermore, the quality of the KMeans clustering was evaluated using Silhouette score and the Elbow method. The optimal number of clusters are identified by those validation statistics. The significance of this approach is that the optimal credit limits generated by these clustering models suit dynamic behaviors of the customer which in turn increases customer satisfaction while contributing to reducing customer churn and potential loss of revenue.Publication Embargo Authdna: An adaptive authentication service for any identity server(IEEE, 2019-12-05) De Silva, H. L. S. R. P; Wittebron, D. C; Lahiru, A. M. R; Madumadhavi, K. L; Rupasinghe, L; Abeywardena, K. YAdaptive authentication refers to the way that configures two factors or multi-factor authentication, based on the user's risk profile. One of the most pressing concerns in modern days is the security of credentials. As a solution, developers have introduced the multifactor authentication. The multi-factor authentication has an adverse effect on user experience. This paper proposes a novel adaptive authentication mechanism which tries to eradicate the negative user experience of the traditional multi factor authentication systems. Adaptive authentication gathers information about each user and prevents fraudulent attempts by validating them against the created profiles. This approach will increase the usability, user-friendliness by introducing multi-factor authentication only when its necessary using a risk based adaptive approach. Furthermore, the solution ensures security by authenticating the legitimate user through collectively analyzing the properties, behavior, device and network related information. In the creation of the user profile, the adaptive authentication system will gather and analyze the user typing behaviors using a unique recurrent neural network algorithm named LSTMs with 95.55% accuracy and mouse behaviors using SVMs with 95.48% accuracy. In device-based authentication, a fingerprint is generated to the browser and to the mobile device which is utilized in the analysis of the accuracy rate of the authentication. Blacklisting and whitelisting of the networks and geo velocity of the authentication request are captured under the geolocation and network-based authentication. All the accuracy rates are fed to the risk-based authentication which helps the decision of re-authentication or in the grant of access to the system by analyzing the risk score generated for the authentication request.Publication Embargo Automated Attendance Monitoring System Using IoT(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Kovelan, P.; Thisenthira, N.; Kartheeswaran, T.Most of the process is automated to reduce human intervention and manual mistakes in this busy world. It will be easy if we can automate some complex, sensitive activities of day to day life. This paper discusses a smart attendance system that automatically monitors and manages the attendance of students in an educational institution. Further, this system makes automated analysis and prepares a detailed report weekly, monthly and annually. The whole system is developed with an Arduino microcontroller and RFID readers. Also, GSM and Wi-Fi communication modules are used to make convenient communication depend on the availability of the network. A microchip (microSD) is placed to store data in case of communication failure and those stored data will be uploaded bulk when the communication channel is restored. This system will reduce a lot of manual work of educators and education administrators of an education institutionPublication Embargo Automated Smart Checkup Portal Network System to Check the Vision and Hearing of the Patients(IEEE, 2019-12-05) Dias, A. A. T. K; Vithusha, J; Liyadipita, L. A. M. T. J; Abeygunawardhana, P. K. WThe human eye and ear are impressive systems in the body. Vision and Hearing are the main functions of those organs. We should regularly check our vision and hearing, It's the most reliable ways to maintain good vision and hearing. Not only that, every patient must keep a medical history and previous checkup records, those related to vision and hearing and those results should be real-time processed. Therefore, we have built an Automated Centralized Smart EE (eye and ear) Checkup Portal Network System. We have designed and developed an automated centralized vision and hearing checkup rooms network, Automated centralized live traffic indicating cloud-based web application to establish in every hospital.Publication Embargo Automated Smart Checkup Portal Network System to Check the Vision and Hearing of the Patients.(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Dias, A.A.T.K.; Vithusha, J.; Liyadipita, L.A.M.T.J.; Abeygunawardhana, P.K.W.The human eye and ear are impressive systems in the body. Vision and Hearing are the main functions of those organs. We should regularly check our vision and hearing, It's the most reliable ways to maintain good vision and hearing. Not only that, every patient must keep a medical history and previous checkup records, those related to vision and hearing and those results should be real-time processed. Therefore, we have built an Automated Centralized Smart EE (eye and ear) Checkup Portal Network System. We have designed and developed an automated centralized vision and hearing checkup rooms network, Automated centralized live traffic indicating cloud-based web application to establish in every hospital.Publication Embargo An Automated Tool for Memory Forensics(IEEE, 2019-12-05) Murthaja, M; Sahayanathan, B; Munasinghe, A. N. T. S; Uthayakumar, D; Rupasinghe, L; Senarathne, AIn the present, memory forensics has captured the world's attention. Currently, the volatility framework is used to extract artifacts from the memory dump, and the extracted artifacts are then used to investigate and to identify the malicious processes in the memory dump. The investigation process must be conducted manually, since the volatility framework provides only the artifacts that exist in the memory dump. In this paper, we investigate the four predominant domains of registry, DLL, API calls and network connections in memory forensics to implement the system `Malfore,' which helps automate the entire process of memory forensics. We use the cuckoo sandbox to analyze malware samples and to obtain memory dumps and volatility frameworks to extract artifacts from the memory dump. The finalized dataset was evaluated using several machine learning algorithms, including RNN. The highest accuracy achieved was 98%, and it was reached using a recurrent neural network model, fitted to the data extracted from the DLL artifacts, and 92% accuracy was reached using a recurrent neural network model, fitted to data extracted from the network connection artifacts.Publication Embargo An Automated Tool for Memory Forensics(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Murthaja, M.; Sahayanathan, B.; Munasinghe, A.N.T.S.; Uthayakumar, D.; Rupasinghe, L.; Senarathne, A.In the present, memory forensics has captured the world’s attention. Currently, the volatility framework is used to extract artifacts from the memory dump, and the extracted artifacts are then used to investigate and to identify the malicious processes in the memory dump. The investigation process must be conducted manually, since the volatility framework provides only the artifacts that exist in the memory dump. In this paper, we investigate the four predominant domains of registry, DLL, API calls and network connections in memory forensics to implement the system ‘Malfore,’ which helps automate the entire process of memory forensics. We use the cuckoo sandbox to analyze malware samples and to obtain memory dumps and volatility frameworks to extract artifacts from the memory dump. The finalized dataset was evaluated using several machine learning algorithms, including RNN. The highest accuracy achieved was 98%, and it was reached using a recurrent neural network model, fitted to the data extracted from the DLL artifacts, and 92% accuracy was reached using a recurrent neural network model,fitted to data extracted from the network connection artifacts.Publication Embargo Ayurvedic Knowledge Sharing Platform with Sinhala Virtual Assistant(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Jayalath, A.D.A.D.S.; Nadeeshan, P.V.D.; Amarawansh, T.G.A.G.D.; Jayasuriya, H.P.; Nawinna, D. P.Apart from western medicine methods Ayurveda medicinal system is a very huge and better resulting medicinal technique. In these Ayurveda methods identification of indigenous plants to predict the medicines is very important and must do very carefully. Generally main components that we use to identify a plant are leaf, flower, trunk and root etc. Among these features, we use images of leaves and flowers. To do this we are using deep learning based CNN approaches and machine learning and technologies. Those are OpenCV, and Tensorflow classification algorithm. According to the evidences that we gathered from surveys and interviews that we conducted with the responsible parties we could find out that lots of people don’t have much knowledge about indigenous medicinal plants and their Ayurveda treatment methods. To overcome this problem we implemented Ayurveda information centralized chatbot which is able to answer user’s questions relevant to the Ayurveda and indigenous medicinal plants. Chatbot will analyze the question that user asks and will provide answers according to that. Another useful feature of this system is it provides relevant information of Ayurveda doctors. So users can find doctors according to their needs and they are able to rate and give recommendations for the doctors. That will be help others to find doctors more easily and efficiently without any doubt.Publication Embargo Ayurvedic Knowledge Sharing Platform with Sinhala Virtual Assistant(IEEE, 2019-12-05) Jayalath, A. D. A. D. S; Nadeeshan, P. V. D; Amarawansh, T. G. A. G. D; Jayasuriya, H. P; Nawinna, D. PApart from western medicine methods Ayurveda medicinal system is a very huge and better resulting medicinal technique. In these Ayurveda methods identification of indigenous plants to predict the medicines is very important and must do very carefully. Generally main components that we use to identify a plant are leaf, flower, trunk and root etc. Among these features, we use images of leaves and flowers. To do this we are using deep learning based CNN approaches and machine learning and technologies. Those are OpenCV, and Tensorflow classification algorithm. According to the evidences that we gathered from surveys and interviews that we conducted with the responsible parties we could find out that lots of people don't have much knowledge about indigenous medicinal plants and their Ayurveda treatment methods. To overcome this problem we implemented Ayurveda information centralized chatbot which is able to answer user's questions relevant to the Ayurveda and indigenous medicinal plants. Chatbot will analyze the question that user asks and will provide answers according to that. Another useful feature of this system is it provides relevant information of Ayurveda doctors. So users can find doctors according to their needs and they are able to rate and give recommendations for the doctors. That will be help others to find doctors more easily and efficiently without any doubt.Publication Embargo Cloud Native Efficient Solution for API Migration Across Environments For Agile Integration Enterprises(IEEE, 2019-12-05) Jayakody, A; Perera, A. K. A; Perera, G. L. A. K. NThis paper describes an approach to minimize the effort and time in recreating Application programming interface artifacts and facilitate cross-collaboration and efficient migration across heterogeneous platforms environments without any significant post-migration changes and additional effort. The current software development evolution came up with the Agile concept of developing and delivering products in milestones based approach software development organizations are now maintaining separate environments for development, quality assurance, and production. These environments execute independently and have their deployments and own methods of traffic control. When moving Application programming interface artifacts from one environment to another, all the created APIs need to migrate across different environments to test the exact functionality and behavior of the application. Our motivation is to minimize the effort and time in recreating APIs and facilitate accurate and efficient migration across different environments without any significant post-migration changes and additional effort.Publication Embargo Code Vulnerability Identification and Code Improvement using Advanced Machine Learning(IEEE, 2019-12-05) Ruggahakotuwa, L; Rupasinghe, L; Abeygunawardhana, P. K. WCyber-attacks are fairly mundane. The misconfigurations of the source code can result in security vulnerabilities that potentially encourage the attackers to exploit them and compromise the system. This paper aims to discover various mechanisms of automating the detection and correction of vulnerabilities in source code. Usage of static and dynamic analysis, various machine learning, deep learning, and neural network techniques will enhance the automation of detecting and correcting processes. This paper systematically presents the various methods and research efforts of detecting vulnerabilities in the source code, starting with what is a software vulnerability and what kind of exploitation, existing vulnerability detection methods, correction methods and efforts of best researches in the world relevant to the research area. A plugin will be developed which is capable of intelligently and efficiently detecting the vulnerable source code segment and correcting the source code accurately in the development stage.Publication Embargo Comparative analysis of the application of Deep Learning techniques for Forex Rate prediction(IEEE, 2019-12-05) Aryal, S; Nadarajah, D; Kasthurirathna, D; Rupasinghe, L; Jayawardena, CForecasting the financial time series is an extensive field of study. Even though the econometric models, traditional machine learning models, artificial neural networks and deep learning models have been used to predict the financial time series, deep learning models have been recently employed to do predictions of financial time series. In this paper, three different deep learning models called Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN) and Temporal Convolution Network (TCN) have been used to predict the United States Dollar (USD) to Sri Lankan Rupees (LKR) exchange rate and compared the accuracy of the models. The results indicate the superiority of CNN model over other models. We conclude that CNN based models perform best in financial time series prediction.Publication Embargo Comparative analysis of the application of Deep Learning techniques for Forex Rate prediction(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Aryal, S.; Nadarajah, D.; Kasthurirathna, D.; Rupasinghe, L.; Jayawardena, C.Forecasting the financial time series is an extensive field of study. Even though the econometric models, traditional machine learning models, artificial neural networks and deep learning models have been used to predict the financial time series, deep learning models have been recently employed to do predictions of financial time series. In this paper, three different deep learning models called Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN) and Temporal Convolution Network (TCN) have been used to predict the United States Dollar (USD) to Sri Lankan Rupees (LKR) exchange rate and compared the accuracy of the models. The results indicate the superiority of CNN model over other models. We conclude that CNN based models perform best in financial time series prediction.Publication Embargo Comprehensive Forensic Data Extraction and Representation System for Windows Registry(IEEE, 2019-12-05) W. De Alwis, C; Rupasinghe, LComputer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. When considering computer forensics, registry forensics plays a vital role because it helps identifying system configurations, application details, user configurations and helps in finding registry malware. Therefore, it is significant to extract this registry information to simplify the investigations for forensic professionals. At present, tools are limited to few commonly used registry information and there is a much border area to cover. Investigators have to manually search for the registries for required artifacts. But the nature and complexity of the registry file structure limits most of the investigators using these registries. Limiting this registry analysis only to the physical registry files and not considering the ability of extraction of registry information from Volatile Memory is another significant issue in registry forensics. Because these tools are only rely on the physical registry files and cannot extract registry artifacts from Volatile Memory. In order to cater to this problem, this research provide a comprehensive solution to registry analysis. This system is capable of extracting registry information from both physical registry files and Volatile Memory.Publication Embargo Crowd-sourced Approach to Generate Real-time Passenger Train Time Table(IEEE, 2019-12-05) Weerathunga, D. C. B; Jayawickckrama, M. M. M; Jayasekara, U; Kasthurirathna, D; Wijetunga, P. SAvailability of real-time public train transportation information can help to improve the commuters' transportation needs. Most of the time the guaranteed information is only supported in a closed system. Due to the administrative issue, there is no infrastructure to provide real-time data to any interested party. This paper proposed a framework that aims to provide a multiple-sourced crowdsourcing approach to generate Real-time Public Train information. The proposed system will enhance the accuracy as well as efficiency of the current system to provide accurate real-time train Status by crowdsourcing train location GPS (Global Positioning System) data from the passenger's smartphones. The tracing data are used to update the arrival/departure time using a predictive data source. The basic information is collected and distributed of each train route, stops and schedules. The `User Report Information' includes information related to trains and can be shared among the other interested parties through our System.Publication Embargo Deep learning based flood prediction and relief optimization(IEEE, 2019-12-05) Pathirana, D; Chandrasiri, L; Jayasekara, D; Dilmi, V; Samarasinghe, P; Pemadasa, NFlood is a major natural disaster that occurs recurrently in Sri Lanka. It is important to stay on alert and get early preparations to avoid unnecessary risks that cause damage to both life and property. This project developed a flood assistance application “DHARA” to support early flood preparation and flood recovery process. DHARA mobile application facilitates river water level prediction, safest evacuation route suggestion and provides relevant warnings and alert notifications and the web application provides affected area detection, victim and relief estimation to assist flood recovery management. This system is developed as a mobile application and a web application. A recurrent neural network architecture named Long Short Term Memory (LSTM), Convolutional Neural Network (CNN), a path finding algorithm namely A star (A*) algorithm and a clustering technique named Fuzzy Clustering are used for the development of the system. The system is verified with sample data related to “Wellampitiya” and “Kaduwela” area based on river “Kelanl”. The river water level prediction model has successfully predicted the water level 4 hours in advance. The verification results of the river water level prediction showed a satisfactory agreement between the predicted and real records with 85.4% accuracy.
