Computer Science & Engineering Symposium
Permanent URI for this communityhttp://192.248.9.226/handle/123/19493
Browse
Browsing Computer Science & Engineering Symposium by Title
Now showing 1 - 20 of 82
- Results Per Page
- Sort Options
- item: Conference-Full-textAdapting general purpose platform-as-a- service for customized product deployment(Department of Computer Science and Engineering, University of Moratuwa., 2014-09) Senanayake, DA; Perera, I; Meedeniya, D; Perera, SThe web services industry has evolved to a point where a lot of services are provided for free or a free tier of services is offered, most of the times. An attempt of trying to exploit this situation is to try and implement a game server based on completely free and open-source technologies or at least not exceeding the free tiers of commercial technologies.
- item: Conference-Full-textAnalysis on human-computer interaction(Department of Computer Science and Engineering, University of Moratuwa., 2012) Chathuranga, RGC; Dassanayaka, DMSR; Jayasekara, WAS; Kannangara, DLS; Wattalaeniya, LPK; De Silva, RTime spent by humans, interacting with computer systems to perform day today activities increase with the development of the world. Hence it is useful and important to identify and analyze the factors that affect Human Computer Interaction (HCI). These factors are categorized under three topics Human-computer interaction methodology based factors, interface design based factors and human factors for the convenience of analysis. Factors from all three categories are analyzed to gain a broader knowledge in each area. After the analysis of factors from all three categories, a discussion is provided which identifies various ways to improve HCI based on analyzed factors.
- item: Conference-Full-textApplication based extension for windows network monitor widget(Department of Computer Science and Engineering, University of Moratuwa., 2014-09) Kumarasinghe, CU; Perera, I; Meedeniya, D; Perera, SThis paper was written to give an idea about the windows network monitor extension which was developed in order to improve system security and application accountability of windows processes and to help the user to be aware of how much bandwidth is used by each process.
- item: Conference-Full-textApplications of game theory in software engineering(Department of Computer Science and Engineering, University of Moratuwa., 2012) Herath, SWHMSP; Gunarathna, UARR; Hettiarachchi, HAC; Herath, HMAB; Wickramanayake, SKK; De Silva, RTurning a new chapter in game theory some of its applications to the field of Software Engineering are explored recently. Game theory addresses strategic problems. There are many aspects in software development process which could be analyzed using game theory. This is a discussion and a research of how game and why theory is applied Many real life situations including situations arise in software engineering process can be abstracted into prisoners' dilemma situations. Game theory principal usage in software engineering, technical and non technical aspects of software engineering, project management and avoiding software development failures are discussed in game theory perspective. Maintenance is another major aspect of Software Engineering. Application of strategies of game theory in software maintenance would be beneficial. In that way game theory can be used for the benefit of the software engineering processes because meetings are ubiquitous in software engineering projects.
- item: Conference-Full-textApplications of parallel computing(Department of Computer Science and Engineering, University of Moratuwa., 2012) Dassanayake, DMUC; De Silva, LYSG; Fernando, MDY; Jayawardana, DDSL; Ranatunga, AI; De Silva, Rparallel computing is one of the main solutions for the newly arising computational problems, implementations of parallelism are multi-core systems. To improve the performance in specific usage such as matrix multiplication we have to analyse the algorithms behind it. Markov's chains and memetic algorithms are two algorithmic implementations of parallel programming. Data mining is used in AI development, but can be efficiently used to optimize parallel computing as well.
- item: Conference-Full-textAskfedora ux/ui and functionality overhaul(Department of Computer Science and Engineering, University of Moratuwa., 2016-12) Welivita, KA; Perera, I; Meedeniya, DAskFedora is a well known community knowledge base and a support forum, which provides community support for Fedora users. It is powered by Askbot, a Python and DJango based web application. With time, the user interface and user experience of AskFedora had come to a point of having a comprehensive overhaul. This is to have some uniformity with the other Fedora websites and have improved usability features. The AskFedora redesign project was aimed at achieving the goal of providing better user experience for the users. The project was conducted in three main phases, which were user experience analysis and mock-ups development, coding and integration with Askbot. The designs done are mainly based on user experience research and the styles used follow concepts of responsiveness and cross browser compatibility.
- item: Conference-Full-textAutomated programming assignment grading system(Department of Computer Science and Engineering, University of Moratuwa., 2017-12) Subashith, SKTD; Perera, I; Meedeniya, DToday there are many e-learning systems that fulfill the thirst for education. Those e-learning systems have many courses in different fields. There are so many e-classes that teach how to program in many different programming languages. But in most of those e-classes instructors have to spend a lot of time to evaluate assignments submitted by students. If the grading process can be done automatically, it will save lots of time of instructors. There are many systems that use the functionality of evaluating programs automatically. They provide support for hosting online programming competitions, but most of them do not provide platforms for e-classes. Therefore Automated Programming Assignment Grading System (APAGS) is the solution which supports both e-class environment and programming competition environment. The APAGS is a web system which has developed using Symfony framework according to the model, control and view architecture to provide both e-class environment and competition hosting environment. Its main goal is to evaluate the programs and analyse results for both assignments and competitions.
- item: Conference-Full-textAutomator – location and battery level based profile changer, alarm and sms sender(Department of Computer Science and Engineering, University of Moratuwa., 2014-09) Kumarasiri, MKDS; Perera, I; Meedeniya, D; Perera, IThis paper discusses the project Automator which is a location and battery level based automatic profile changer, location based alarm and SMS sender. This is a third party software developed for Android operating system. The application takes the location of the device from GPS and changes settings of the device as the user has defined earlier. The main advantage of this software comparing to other similar software in the Android market is the customization in selecting the settings the user wanted to change.
- item: Conference-Full-textBehavior dynamics of sms gangs(Department of Computer Science and Engineering, University of Moratuwa., 2012) Liyanagunawardana, AS; Shanika, TGT; Rajagopalasarma, J; Wijenayake, CBA; Wijeweera, BS; De Silva, RThis paper discuss about short message services and its usages and the dynamical behaviors of the people who use this services. The report starts with an introduction about how the SMS system is working and what are the backbones. There are four fundamental categories of usage. They are emergency services, commercial uses, business uses, and worldwide usages. There are so many advantages of SMS and as well as disadvantages. One of the main advantages we specifically discussed is the mobile learning through SMS. Other than advantages and disadvantages SMS created a new culture in the emerging society. The social networking in is becoming the other inevitable technology that starts to lead the world’s culture. SMS plays a major role in social networking . The communication style and language culture used in SMS also seems to show a new dynamical behavior among the people. Finally this report covers the Sri Lankan environment of SMS users and their behaviors.
- item: Conference-Full-textBig data visualization(Department of Computer Science and Engineering, University of Moratuwa., 2016-12) Abeysekara, M; Perera, I; Meedeniya, DComputer based visualizations have been a popular approach that provides accurate and efficient visualization techniques to the users. There is an increasing growth in geographical data with the development of mobile devices. There is a trend to analyze the human behaviors and patterns with respect to the geographical locations in order to take decisions and predictions. This paper presents a Human Movement Visualizer tool to provide populating flow data between regions of a given map. The tool was designed to use with modern web browsers by implementing the complete functionality of the system using client-side JavaScript language. Also the tool can integrate with other visualization tools by introducing component based architecture to the system. Users of this tool can give a Shapefile as a base map and CSV (Comma Separated Values) based data to visualize the geographical data. The main goal of this tool is to provide visualizations for the transport planning in Sri Lanka.
- item: Conference-Full-textBlind quiz: android application for visually impaired people to access moodle quizzes(Department of Computer Science and Engineering, University of Moratuwa., 2015-10) Subasinghe, SP; Pemasiri, A; Bandara, M; Meedeniya, D; Perera, IAlthough the Moodle facilitates the Accessibility feature for visually impaired people it is not much user friendly for them. The requirement of third party software is the main limiting factor in the existing solution. But Android provides rich accessibility service for different able people. Therefore the application uses the Android platform to give access to Modular object oriented dynamic learning environment (Moodle). This application provides support to access quiz course material on Moodle. People who are visually impaired cannot access Moodle quizzes due to their disability as normal ones. Necessarily they need an external support from login to finish accessing Moodle. But they can access the mobile devices using Android Accessibility service. Thus the project is aimed to build Android Interface to Moodle quizzes for visually impaired people using Android Accessibility service.
- item: Conference-Full-textBlood bank management system(Department of Computer Science and Engineering, University of Moratuwa., 2016-12) Thirunavukkarasu, N; Perera, I; Meedeniya, D“BLOOD” is one of the most essential necessities of our lives. Mostly during accidents or most of the hospitals issues the need for blood is the common problem. In addition to emergency requirements, advances in medicine have increased the need for blood in many ongoing treatments and elective surgeries. This paper presents an android application blood bank management system that enables individuals who want to donate blood to help the needy. It also enables hospitals to send blood request to the donors who were already registered to the system. The system has developed by using java, PHP, and MySQL as a database system to manage and store the data. The Waterfall Methodology, which is the traditional version and the classic approach of a system development life cycle, is used to develop and build the android based blood bank system. The system targets three types of user: the public who wants to donate blood, the hospitals who need blood, and the admin who manage the system. In this application the system has utilized the Google distance API to find the distance between donors that are in favor of donating blood and hospitals. The android application is readily scalable, efficient and adaptable to meet the complex need of blood for the hospitals.
- item: Conference-Full-textBloodforall – android application for blood donors(Department of Computer Science and Engineering, University of Moratuwa., 2015-10) Uthayakumar, M; Pemasiri, A; Bandara, M; Meedeniya, D; Perera, IDay to day there are many blood donations happening all over the world to save many lives. The main problem in blood donation is finding the blood donors within a short period of time during an emergency. Currently there is no proper solution exist for this problem. Although there are some blood donor applications in Android market already, none of them solves this problem completely. Many blood donors are not interested in using those applications due to the privacy issues. This application aims to provide a solution to all the problems in the existing blood donor applications. This paper discusses about the BloodForAll Application.
- item: Conference-Full-textBook portal operations management system(Department of Computer Science and Engineering, University of Moratuwa., 2017-12) Dangalla, DADJS; Perera, I; Meedeniya, DThis paper discusses a system that provides an admin system and a public website for a book store with multiple branches. The admin system allows multiple user levels of the staff members to log in and perform separate duties within the system and the public website allows customers to view availability of items and purchase items online. The admin system generates monthly and annual reports, manages user notifications, incorporates role based access control, saves user logs and provides an invoice for physical bill issue in addition to controlling the items showcased in the website and managing the online purchase requests. The system is implemented using JSP and MySQL on MVC architecture and guest checkouts are integrated using PayPal.
- item: Conference-Full-textBridging the digital divide - a social and technical point of view(Department of Computer Science and Engineering, University of Moratuwa., 2012) De Silva, HP; Siriwardana, TWRO; Somasiri, RPIT; Surasinghe, SAHB; Surendra, KHA; De Silva, RThe purpose of this literature review is to provide information about current status of digital divide, explore reasons for digital divide and issues rose on society and provide a summary of initiatives that can be taken to overcome digital divide. The scope is limited to explore ways of securing the needed infrastructure from a technical point of view and a social point of view.
- item: Conference-Full-textCeylon bus routes: a bus route guide(Department of Computer Science and Engineering, University of Moratuwa., 2016-12) Nimalsiri, NI; Perera, I; Meedeniya, DMobility is a basic human requirement for traversing between different locations. Public transport bus service fulfills this requirement by operating according to a published timetable along a route calling at agreed bus stops. Despite its progress at a rapid pace, moving commuters are riddled with problems of finding the correct bus route to reach their desired destinations. The use of mobile phone applications is an attractive alternative to guide passengers through correct bus routes. This paper discusses the project, “Ceylon Bus Routes” which is a Microsoft Windows universal application built as a solution for finding bus routes in Sri Lanka. This application is significant because it works offline and it can be run on any Windows based device. The goal of the application is to display the best routes as well as all the routes between two locations requested by the user. The application also uses GPS technology to track user location in case if the user does not know his or her actual location.
- item: Conference-Full-textComputability in cryptography(Department of Computer Science and Engineering, University of Moratuwa., 2012) Iroshan, AKA; Indrajee, KHH; Mahawithana, P; Dharshana, KUGS; Premarathna, PHSR; De Silva, RCryptography is a concept and a methodology for secret communication, which is used and improved thousands of years. Cryptography includes a vast variety of implementation schemes, starting from simple shifting ciphers to DNA algorithms. In this paper we discuss extensively the algorithms behind those cryptographic schemes and the computability aspects of such algorithms. We outline the advantageous factors in computational complexity in such schemes. Also some interesting research being done on this area and problem areas where further research is needed, are outlined.
- item: Conference-Full-textComputer vision library for western music sheet notations(Department of Computer Science and Engineering, University of Moratuwa., 2015-10) Rasnayaka, S; Pemasiri, A; Bandara, M; Meedeniya, D; Perera, IThis paper discusses a computer vision system to detect western music notations from images. The developed library will take in images of western music sheet notation and identify the key features necessary to extract the notes. The images will go through several pre-processing stages and then using straight line detection techniques the staff and notes will be detected. The paper will discuss the algorithms used and developed to achieve this. Finally the paper will present the accuracy measures in the developed system for different types of images.
- item: Conference-Full-textComputers and intelligence: the brain, machine and intelligence(Department of Computer Science and Engineering, University of Moratuwa., 2012) Weerasinghe, BAJN; Weerasinghe, VP; Pirinthapan, M; Nanayakkara, DAU; Perera, LNPT; De Silva, RThis paper discusses on human mind and computer intelligence. It briefly discusses about the structure of the brain and explores how human brain can interact with machines using Brain Computer Interaction. Then the paper discusses about the origins of Artificial Intelligence, current state of Al, its applications and implications to the human society. The idea of "true human like intelligence" and the possibility of machines having such intelligence is explored.
- item: Conference-Full-textCopyright infringement of software(Department of Computer Science and Engineering, University of Moratuwa., 2012) Anicitus, PDDA; Dissanayake, MDAS; Jayawardena, SS; Lakjeewa, DM; Basnagoda, SNRThe evolutionary development of Information and Communication Technology has become a doubled edge knife since it has made human life console and easy, and at the same time unsafe and vulnerable. In this paper we have put an effort to search research and understand the means of copyright violation in software industry and methods of preventing.