International Conference on Advancements in Computing [ICAC]

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/312

The International Conference on Advancements in Computing (ICAC) is organized by the Faculty of Computing of the Sri Lanka Institute of Information Technology (SLIIT) as an open forum for academics along with industry professionals to present the latest findings and research output and practical deployments in computing.

The primary objective of ICAC is to promote innovative research that addresses real-world challenges and contributes to the social well-being of communities. The conference provides a dynamic platform for researchers from around the world to present groundbreaking findings, exchange ideas, and establish meaningful collaborations.

https://icac.lk

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationEmbargo
    Sinhala Conversational Interface for Appointment Management and Medical Advice
    (2020 2nd International Conference on Advancements in Computing (ICAC), SLIIT, 2020-12-10) Rajapakshe, D. D. S.; Kudawithana, K. N. B.; Uswatte, U. L. N. P.; Nishshanka, N. A. B. D.; Piyawardana, A. V. S.; Pulasinghe, K. N.
    This paper proposes an intelligent conversational user interface to assist Sinhala speaking users to make appointments with doctors and to obtain medical advices. This Sinhala Conversational Interface for Appointment Management and Medical Advice (SCI-AMMA) consists of Speech Recognition unit, Query Processing unit, Dialog Management unit, Voice Synthesizer unit, and User Information Management unit to handle user requests and maintain a meaningful dialogue. The SCI-AMMA gets the users' speech utterances and recognize the language content of it for further processing. Language content is further processed using query processing unit to identify users' intent. To fulfil the users' intent, a reply is generated from Dialogue Management Unit. This reply/answer will be delivered to the user by means of a voice synthesizer. The proposed system is successfully implemented using state of the art technology stack including Flutter, Python, Protégé and Firebase. Performance of the system is demonstrated using several sample scenarios/dialogues.
  • Thumbnail Image
    PublicationEmbargo
    Secure Communication Using Steganography in IoT Environment
    (2020 2nd International Conference on Advancements in Computing (ICAC), SLIIT, 2020-11-10) Amjath, M.I.M.; Senthooran, V.
    IoT is an emerging technology in modern world of communication. As the usage of IoT devices is increasing in day to day life, the secure data communication in IoT environment is the major challenge. Especially, small sized Single-Board Computers (SBCs) or Microcontrollers devices are widely used to transfer data with another in IoT. Due to the less processing power and storage capabilities, the data acquired from these devices must be transferred very securely in order to avoid some ethical issues. There are many cryptography approaches are applied to transfer data between IoT devices, but there are obvious chances to suspect encrypted messages by eavesdroppers. To add more secure data transfer, steganography mechanism is used to avoid the chances of suspicion as another layer of security. Based on the capabilities of IoT devices, low complexity images are used to hide the data with different hiding algorithms. In this research study, the secret data is encoded through QR code and embedded in low complexity cover images by applying image to image hiding fashion. The encoded image is sent to the receiving device via the network. The receiving device extracts the QR code from image using secret key then decoded the original data. The performance measure of the system is evaluated by the image quality parameters mainly Peak Signal to Noise Ratio (PSNR), Normalized Coefficient (NC) and Security with maintaining the quality of contemporary IoT system. Thus, the proposed method hides the precious information within an image using the properties of QR code and sending it without any suspicion to attacker and competes with the existing methods in terms of providing more secure communication between Microcontroller devices in IoT environment.