Research Publications Authored by SLIIT Staff
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4195
This collection includes all SLIIT staff publications presented at external conferences and published in external journals. The materials are organized by faculty to facilitate easy retrieval.
Browse
5 results
Search Results
Publication Embargo A framework for Business Process Re-engineering to reduce the number of processes-a case study of National Blood Transfusion Services(IEEE, 2016-03-11) Jayakody, A; Pemarathna, H. P. P. A; Lokuliyana, S; Mapa, N. TBlood Donation and Blood Transfusion Services play a vital role in saving people's lives. It is a known concern that the blood donation process usually consumes a lot of time and effort from both donors and medical staff. This issue is present, mainly due to the absence of a concrete and precise information system. If such a systems is implemented it could have the ability to allow donors and blood donation centers to communicate efficiently and collaborate with each other to minimize the time and effort required for the blood donation process. Besides, most blood banks work in isolation and are not integrated with other blood donation centers, which affect and degrade the quality of overall blood donation and blood transfusion services. This work aims at developing a standard framework named as “One Blood” based on business process re-engineering concepts, cloud storage services, and web application development technologies. This paper comprehensively describes the conceptual framework based on a case study of National Blood Transfusion Services in Sri Lanka. As a result, several pitfalls, highly critical processes, and points of failure were identified, which needs to be redefined. Improving the workflows and organizing the processes was conducted by the application of BPR concepts followed by the proposed framework. To further amplify the application of BPR two additional verticals namely Process Re-Organization and Radical Redesign was aligned with the Process Re-engineering phase. Process Re-Organization performs the comparing and contrasting of manual and systematic approaches while Radical Redesign enables the chance to leverage IT related technologies to achieve integration and automation of processes. The outcome of this research was presented as a cloud-based centralized web solution for the NBTS using the One Blood System by the integration of all of these concepts and technologies.Publication Embargo A survey: IoT enable framework for water quality measurement and distribution(IEEE, 2018-08-08) Lokuliyana, S; Jayakody, A; Bandara, N. B. R. P; Deshapriya, J. W. P; Kavinda, P. C; Wijewickrema, T. LReal-time water quality detection consists of a great practical significance and also it led to management of precious water resources. This paper suggests an IoT enabled framework that analyses, monitor, report, maintain and distribute the physical and chemical properties of water. pH is how acidic or alkaline the water is one parameter that used to analyze the quality of water (7 in pH scale is neutral) apart from this chemical factor, two physical factors are considered in analyzing. Turbidity the measurement of how particle suspended in water, which led to lower the dissolved oxygen, reduce the photosynthesis of aquatic plants. Temperature is the other property, this caused by air temperature, groundwater inflows, exposure to sunlight. The authors examine through various existing implementations and research on such system and attempt to provide an overview of the research gaps and research problems available enabling further pathways.Publication Embargo Trustworthy provenance framework for document workflow provenance(IEEE, 2016-03-11) Rupasinghe, L; Weerasena, H. H; Murray, IDocument workflows, which plays a major role in enterprise business process automation, are dynamic and prone to be changed over time. Assuring the provenance of these workflows is important when comes to quality, long term preservation, forensics and regulatory compliance. This research introduces a Provenance Framework for collecting workflow provenance data, storing them in documents as metadata securely and querying stored provenance data. The author uses the concept of making data objects independent and consider provenance data as intrinsic property of the data object, to support long term preservation of documents with provenance and to maintain the link between the data object and its provenance in cloud over time. Provenance data modeling and representation is done according to the W3C PROV Model. XMP framework is used to store and query provenance data as metadata in documents. Document signatures and metadata encryption is used to ensure security of provenance data.Publication Embargo Post implementation framework for ERP systems with special reference to Sri Lanka(IEEE, 2013-04-26) Kiriwandeniya, I; Ruwan, V. U. A; Samarasinghe, S. S. U; Samarakoon, S. M. P. A; Kahandawarachchi, C; Thelijjagoda, SOver the past decade global competition and high levels of IT enablement in business processes changed how the businesses were managed. Introduction of Enterprise Resource Planning (ERP) and rapid adoption of such was a result of increased competition and higher concern on efficient practices in doing the normal functions of a business. When many large Sri Lankan organizations have adopted ERP systems in order to improve their existing performance measurements, most of the organizations have failed to acquire the true benefits expected mainly due to poor post implementation practices. The main purpose of the research would be to develop a framework for successful ERP post implementation by analyzing the best practices, procedures and success factors based on eight selected large scale manufacturing organizations. A qualitative approach based on case studies has been used in order to derive the importance of each variable to the successfulness of the ERP usage. Furthermore the research was supported by exhaustive interviews and participative observation. The findings identified that ERP post implementation failure was not just caused by technical issues of the system, but more importantly was also attributed to critical problems related to top management, change management and effective user training. The proposed framework will assist Sri Lankan companies in utilizing their ERP usage in the post implementation phase. Furthermore the proposed framework can be used as a guideline in successful ERP implementations. The current research community will be benefited by extending the knowledge in to greater paradigm.Publication Embargo Modeling networked systems using the topologically distributed bounded rationality framework(Wiley Online Library, 2016-11) Kasthurirathna, D; Piraveenan, M; Uddin, SIn networked systems research, game theory is increasingly used to model a number of scenarios where distributed decision making takes place in a competitive environment. These scenarios include peer-to-peer network formation and routing, computer security level allocation, and TCP congestion control. It has been shown, however, that such modeling has met with limited success in capturing the real-world behavior of computing systems. One of the main reasons for this drawback is that, whereas classical game theory assumes perfect rationality of players, real world entities in such settings have limited information, and cognitive ability which hinders their decision making. Meanwhile, new bounded rationality models have been proposed in networked game theory which take into account the topology of the network. In this article, we demonstrate that game-theoretic modeling of computing systems would be much more accurate if a topologically distributed bounded rationality model is used. In particular, we consider (a) link formation on peer-to-peer overlay networks (b) assigning security levels to computers in computer networks (c) routing in peer-to-peer overlay networks, and show that in each of these scenarios, the accuracy of the modeling improves very significantly when topological models of bounded rationality are applied in the modeling process. Our results indicate that it is possible to use game theory to model competitive scenarios in networked systems in a way that closely reflects real world behavior, topology, and dynamics of such systems. © 2016 Wiley Periodicals, Inc. Complexity 21: 123-137, 2016
