Research Publications Authored by SLIIT Staff

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4195

This collection includes all SLIIT staff publications presented at external conferences and published in external journals. The materials are organized by faculty to facilitate easy retrieval.

Browse

Search Results

Now showing 1 - 5 of 5
  • Thumbnail Image
    PublicationEmbargo
    Analyzing Fisheries Market, Shrimp Farming & Identifying Fish Species using Image Processing
    (IEEE, 2022-12-09) Sumeera, S; Pesala, N; Thilani, M; Gamage, A; Bandara, P
    The fisheries industry is vital to the Sri Lankan economy because it provides a living for more than 2.5 million coastal communities and meets more than half of the country’s animal protein needs. Today, the fishery community in Sri Lanka is facing several grant problems. Among them, not getting a decent fish price for their harvesting, the inability to identify diseases in shrimp cages in the early stages, and the inability to identify fish species by observing their external appearance. This research developed a prototype mobile application “Malu Malu” to avoid the above-mentioned problems. It facilitates to the prediction of market fish prices, identifying shrimp diseases in their early stages, and identifying fish species by observing their external appearance. The proposed predictive models of the “Malu Malu” contains three main models developed using inseption V3 Convolutional Neural Network (CNN) model for image classification and Linear Regression is used for creating a model for predictions. The experimental results of these models showed above 85% of accuracy.
  • Thumbnail Image
    PublicationEmbargo
    Development of Agent-Based Centralized Tool For Analyzing and Managing Security-Enhanced Linux Policies using WebSocket Protocol
    (IEEE, 2022-02-23) Rajapaksha, S; Kularatna, I. M
    The SELinux facilitates and includes an extensible "MAC" structure built within the Linux kernel. An application or a process life cycle that runs as a user has the specific authority to access objects such as files, sockets, and other processes with Linux’s default Discretionary Access Control (DAC). SELinux prescribes the access and the progress privileges of each user, application, process, and the files on the system and administers the communications of these elements utilizing a security strategy that determines how severe or indulgent a given Red Hat Enterprise Linux establishment ought to be. However, its constraints such as, not being user-friendly, having too complicated policies, and complex policy description language, are limiting the implementation of SELinux policies in the Information Technology industry. As a result, there is only a little research available on User Interface-based policy management tools. Even those researches have limitations such as the inability to remotely manage a host/server, manual documentation, and the inability to monitor the systems automatically from a dashboard. In order to overcome said research gap and problems, this research will implement a system using a web-socket technology that facilitates the ability to converse in full-duplex through just one TCP connection. This system is included with a web socket-agent, which can be installed in server endpoints and can change SELinux policies, a web-socket server: which can do live communication with the agent to perform policy changes along with the UI component: to manage policies using the user interface and a database component to store policy details.
  • Thumbnail Image
    PublicationEmbargo
    Development of Agent-Based Centralized Tool For Analyzing and Managing Security-Enhanced Linux Policies using WebSocket Protocol
    (IEEE, 2022-04-14) Kularatna, I. M; Rajapaksha, S
    The SELinux facilitates and includes an extensible "MAC" structure built within the Linux kernel. An application or a process life cycle that runs as a user has the specific authority to access objects such as files, sockets, and other processes with Linux’s default Discretionary Access Control (DAC). SELinux prescribes the access and the progress privileges of each user, application, process, and the files on the system and administers the communications of these elements utilizing a security strategy that determines how severe or indulgent a given Red Hat Enterprise Linux establishment ought to be. However, its constraints such as, not being user-friendly, having too complicated policies, and complex policy description language, are limiting the implementation of SELinux policies in the Information Technology industry. As a result, there is only a little research available on User Interface-based policy management tools. Even those researches have limitations such as the inability to remotely manage a host/server, manual documentation, and the inability to monitor the systems automatically from a dashboard. In order to overcome said research gap and problems, this research will implement a system using a web-socket technology that facilitates the ability to converse in full-duplex through just one TCP connection. This system is included with a web socket-agent, which can be installed in server endpoints and can change SELinux policies, a web-socket server: which can do live communication with the agent to perform policy changes along with the UI component: to manage policies using the user interface and a database component to store policy details.
  • Thumbnail Image
    PublicationEmbargo
    Analyzing transport layer protocols to create an API to satisfy timed response in dynamic requirements of wireless networks
    (IEEE, 2014-12-11) De Silva, D. H; Ahamed Ishak, M. M; De Silva, G. C. M; Suranjith, A. V. S; Herath, H. M. H. S
    In modern systems it is very vital to have an efficient data transmission mechanism. This becomes more critical factor when it is involved with a system like a way finding application for vision impaired people or a medical system that notifies the doctor's smartphone when the patient's heart rate goes down. The size of the data that is used frequently by the mentioned systems is relatively small. Additionally it might take more time for connection establishment despite of the requirement of urgency. Thus this kind of data transmission is not ideal for such systems. Therefore this diversity of data transmission makes a special category of systems that needs a reliable, efficient data transfer mechanism since requirements of those systems such as low latency, reliability are not being fully satisfied by the current Transport Layer Protocol (TLP) selection mechanism.
  • Thumbnail Image
    PublicationEmbargo
    Analyzing the Location Feasibility for Retail Businesses using Market Location Factors
    (IEEE, 2018-12-21) Marasinghe, L; Rupasinghe, M; Kumarasinghe, B; Perera, M; Thelijjagoda, S
    The retail industry is a fast growing and a highly revenue generating industry. The location of a retail outlet is the most influencing factor for the success of the business. Therefore selecting a location for a retail store or an outlet is a challenging process. The purpose of this study is to define a method and develop a system to analyze the feasibility of a selected location for a retail store. The factors used in this method are location and market factors of a selected area. In order to define and test the method, we selected three different areas and five different retail store types. To retrieve location data, we used Google Maps web service. Consumer surveys were conducted in selected areas to get information about consumers' shopping patterns and selections. From the web service, we were able to identify transport modes, locations of competing stores and shopping areas. The findings of this study and the method described is useful in deciding the feasibility of any given location for a retail outlet. Also the specified method and model can be modified and extended to analyze different kinds of business locations.