2019
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/2350
Browse
3 results
Search Results
Publication Embargo Smart Monitor for Tracking Child's Brain Development(researchgate.net, 2019-03) Anparasanesan, T; Mathangi, K; Seyon, S; Kobikanth, S; Gamage, AThis paper provides a way to track the brain development of children and improving it via gamification. Machine Learning and Gamification are the key technologies used here. As the population rises, the demand for cost-effective methods to reduce the rate of cognitive decline becomes higher. A mobile application is developed to track and develop the brain development of children. In the mobile application, the child initially undergoes an evaluation phase to determine the current level of the cognitive skills of the child. Milestones particular to that age category are also tracked in this evaluation phase. The results of this evaluation phase are analyzed by the machine learning model and suitable brain games are suggested. K-means algorithm is used to develop the model which is an unsupervised learning algorithm. The dataset is prepared by storing the results of each game category in the evaluation phase. Data preprocessing is done to clean up the dataset. During this period, data undergoes a series of steps. The dataset is divided into 80% and 20%. 80% of the dataset is used as the training dataset and the remaining 20% as the test dataset. The accuracy of the model is checked several times against the test data. Model accuracy is improved through model training and finally, the model got an accuracy of 88.49%. For the child, proper training is given to improve his cognitive skills and thus the brain development using Gamification. Games are developed using the UNITY game engine. The system generates a report and notifies parents about their child's statistics periodically. This paper elaborates the procedure of model development, model training, model testing and development of suitable brain games in details. The results of the research work and future works are also discussed in the following sections.Publication Embargo Analyzing Payment Behaviors And Introducing An Optimal Credit Limit(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Bandara, H.M.M.T.; Samarasinghe, D.P.; Manchanayake, S.M.A.M.Identifying an optimal credit limit plays a vital role in telecommunication industry as the credit limit given to customers is influence on the market, revenue stabilization and customer retention. Most of the time service providers offer a fixed credit limit for customers which may cause customer dissatisfaction and loss of potential revenue. Therefore, it is essential to determine an optimal credit limit that maintains customer satisfaction while stabilizing the company revenue. Clustering algorithms were used to group customers with similar payment and usage behaviors. Then the optimal credit limit derived for each cluster is applicable to all the customers within the cluster. In order to identify the most suitable clustering algorithm, cluster validation statistics namely, Silhouette and Dunn indexes were used in this research. Based on the scores generated from these statistics KMeans algorithm was chosen. Furthermore, the quality of the KMeans clustering was evaluated using Silhouette score and the Elbow method. The optimal number of clusters are identified by those validation statistics. The significance of this approach is that the optimal credit limits generated by these clustering models suit dynamic behaviors of the customer which in turn increases customer satisfaction while contributing to reducing customer churn and potential loss of revenue.Publication Embargo An Automated Tool for Memory Forensics(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Murthaja, M.; Sahayanathan, B.; Munasinghe, A.N.T.S.; Uthayakumar, D.; Rupasinghe, L.; Senarathne, A.In the present, memory forensics has captured the world’s attention. Currently, the volatility framework is used to extract artifacts from the memory dump, and the extracted artifacts are then used to investigate and to identify the malicious processes in the memory dump. The investigation process must be conducted manually, since the volatility framework provides only the artifacts that exist in the memory dump. In this paper, we investigate the four predominant domains of registry, DLL, API calls and network connections in memory forensics to implement the system ‘Malfore,’ which helps automate the entire process of memory forensics. We use the cuckoo sandbox to analyze malware samples and to obtain memory dumps and volatility frameworks to extract artifacts from the memory dump. The finalized dataset was evaluated using several machine learning algorithms, including RNN. The highest accuracy achieved was 98%, and it was reached using a recurrent neural network model, fitted to the data extracted from the DLL artifacts, and 92% accuracy was reached using a recurrent neural network model,fitted to data extracted from the network connection artifacts.
