International Conference on Advancements in Computing [ICAC]
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/312
The International Conference on Advancements in Computing (ICAC) is organized by the Faculty of Computing of the Sri Lanka Institute of Information Technology (SLIIT) as an open forum for academics along with industry professionals to present the latest findings and research output and practical deployments in computing.
The primary objective of ICAC is to promote innovative research that addresses real-world challenges and contributes to the social well-being of communities. The conference provides a dynamic platform for researchers from around the world to present groundbreaking findings, exchange ideas, and establish meaningful collaborations.
Browse
5 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Embargo Success Factors of Requirement Elicitation in the Field of Software Engineering(IEEE, 2022-12-09) Attanayaka, B; Nawinna, D; Manathunga, K; Abeygunawardhana, P. K. WRequirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requirements, difficulty meeting with relevant stakeholders, stakeholder resistance to change, and not enough time set aside for meetings with all stakeholders. The prime causes of software implementation failure have been identified as inadequacies in the treatment of requirements. Without collecting the quality requirement, cannot achieve the goal of a quality software product. Through identifying the success factors affecting requirement elicitation, the paths to the quality requirements can be identified. The success factors identify through this research are experience, business analyst skills, stakeholder relationship, organizational elicitation process. This study aims to identify the factors affecting requirement elicitation based on the data collected from business analysts and similar positions in the software industry through a survey, interviews, and analyzed data to provide the initial validation for the identified factors. Through the analysis, we identified the main factors affecting successful requirement elicitation with a perfect significance value of less than 0.05 for all factors.Publication Embargo Code Vulnerability Identification and Code Improvement using Advanced Machine Learning(IEEE, 2019-12-05) Ruggahakotuwa, L; Rupasinghe, L; Abeygunawardhana, P. K. WCyber-attacks are fairly mundane. The misconfigurations of the source code can result in security vulnerabilities that potentially encourage the attackers to exploit them and compromise the system. This paper aims to discover various mechanisms of automating the detection and correction of vulnerabilities in source code. Usage of static and dynamic analysis, various machine learning, deep learning, and neural network techniques will enhance the automation of detecting and correcting processes. This paper systematically presents the various methods and research efforts of detecting vulnerabilities in the source code, starting with what is a software vulnerability and what kind of exploitation, existing vulnerability detection methods, correction methods and efforts of best researches in the world relevant to the research area. A plugin will be developed which is capable of intelligently and efficiently detecting the vulnerable source code segment and correcting the source code accurately in the development stage.Publication Embargo Automated Smart Checkup Portal Network System to Check the Vision and Hearing of the Patients(IEEE, 2019-12-05) Dias, A. A. T. K; Vithusha, J; Liyadipita, L. A. M. T. J; Abeygunawardhana, P. K. WThe human eye and ear are impressive systems in the body. Vision and Hearing are the main functions of those organs. We should regularly check our vision and hearing, It's the most reliable ways to maintain good vision and hearing. Not only that, every patient must keep a medical history and previous checkup records, those related to vision and hearing and those results should be real-time processed. Therefore, we have built an Automated Centralized Smart EE (eye and ear) Checkup Portal Network System. We have designed and developed an automated centralized vision and hearing checkup rooms network, Automated centralized live traffic indicating cloud-based web application to establish in every hospital.Publication Embargo Drown Prevention and Flood prediction using smart embedded devices(IEEE, 2019-12-05) Samarasinghe, D; De Silva, P. M; Mudalige, T. U; Gamage, M. K. I; Abeygunawardhana, P. K. WDrowning and Flood becomes major negative impact to the mankind and infrastructure. Drowning is caused by the when person go into deeper areas or else due to a person's health condition. Flood is a natural disaster commonly caused by the run of rivers due to excessively highly rainy season or due to environment effect or global warming effect. Hence IoT with sensor technology support us to efficiently cover up this impact for mankind. This research support for each mankind to survive from the drowning threat and this may help for people to survive from the natural disaster like flooding. This research presents two IoT Devices consisting with sensors and monitoring system to determine the flood level, the user condition and water level when user in the water. Then generating alert via the mobile application to notify the user. Machine learning algorithms were implemented to perform the level classification.Publication Embargo Design and implementation of an autonomous indoor surveillance robot based on raspberry pi(IEEE, 2019-12-05) Dharmasena, T; Abeygunawardhana, P. K. WIn recent years robotics has influenced many fields including the security and surveillance domain. Due to convenience and flexibility more and more security robots tend to be deployed in place of humans for routine activities such as area sweeps. While there are many kinds of research have been done regarding this concern, many of the solutions cost more due to their implementation complexity while low-cost implementations are only capable of doing simple activities such as following given local coordinates. This paper describes an autonomous surveillance robot that is being developed while keeping the development costs as low as possible and is capable of performing routine patrols autonomously in indoor environments and detect anomalies around it such as temperature fluctuations, unauthorized personals and report them back to a central computer. This robot can be controlled remotely by security personals to facilitate manual inspections. Due to the development architecture of the robot, more software-based features can be added easily.
