CSE Symposium - 2012
Permanent URI for this collectionhttp://192.248.9.226/handle/123/19494
Browse
Browsing CSE Symposium - 2012 by Title
Now showing 1 - 20 of 20
- Results Per Page
- Sort Options
- item: Conference-Full-textAnalysis on human-computer interaction(Department of Computer Science and Engineering, University of Moratuwa., 2012) Chathuranga, RGC; Dassanayaka, DMSR; Jayasekara, WAS; Kannangara, DLS; Wattalaeniya, LPK; De Silva, RTime spent by humans, interacting with computer systems to perform day today activities increase with the development of the world. Hence it is useful and important to identify and analyze the factors that affect Human Computer Interaction (HCI). These factors are categorized under three topics Human-computer interaction methodology based factors, interface design based factors and human factors for the convenience of analysis. Factors from all three categories are analyzed to gain a broader knowledge in each area. After the analysis of factors from all three categories, a discussion is provided which identifies various ways to improve HCI based on analyzed factors.
- item: Conference-Full-textApplications of game theory in software engineering(Department of Computer Science and Engineering, University of Moratuwa., 2012) Herath, SWHMSP; Gunarathna, UARR; Hettiarachchi, HAC; Herath, HMAB; Wickramanayake, SKK; De Silva, RTurning a new chapter in game theory some of its applications to the field of Software Engineering are explored recently. Game theory addresses strategic problems. There are many aspects in software development process which could be analyzed using game theory. This is a discussion and a research of how game and why theory is applied Many real life situations including situations arise in software engineering process can be abstracted into prisoners' dilemma situations. Game theory principal usage in software engineering, technical and non technical aspects of software engineering, project management and avoiding software development failures are discussed in game theory perspective. Maintenance is another major aspect of Software Engineering. Application of strategies of game theory in software maintenance would be beneficial. In that way game theory can be used for the benefit of the software engineering processes because meetings are ubiquitous in software engineering projects.
- item: Conference-Full-textApplications of parallel computing(Department of Computer Science and Engineering, University of Moratuwa., 2012) Dassanayake, DMUC; De Silva, LYSG; Fernando, MDY; Jayawardana, DDSL; Ranatunga, AI; De Silva, Rparallel computing is one of the main solutions for the newly arising computational problems, implementations of parallelism are multi-core systems. To improve the performance in specific usage such as matrix multiplication we have to analyse the algorithms behind it. Markov's chains and memetic algorithms are two algorithmic implementations of parallel programming. Data mining is used in AI development, but can be efficiently used to optimize parallel computing as well.
- item: Conference-Full-textBehavior dynamics of sms gangs(Department of Computer Science and Engineering, University of Moratuwa., 2012) Liyanagunawardana, AS; Shanika, TGT; Rajagopalasarma, J; Wijenayake, CBA; Wijeweera, BS; De Silva, RThis paper discuss about short message services and its usages and the dynamical behaviors of the people who use this services. The report starts with an introduction about how the SMS system is working and what are the backbones. There are four fundamental categories of usage. They are emergency services, commercial uses, business uses, and worldwide usages. There are so many advantages of SMS and as well as disadvantages. One of the main advantages we specifically discussed is the mobile learning through SMS. Other than advantages and disadvantages SMS created a new culture in the emerging society. The social networking in is becoming the other inevitable technology that starts to lead the world’s culture. SMS plays a major role in social networking . The communication style and language culture used in SMS also seems to show a new dynamical behavior among the people. Finally this report covers the Sri Lankan environment of SMS users and their behaviors.
- item: Conference-Full-textBridging the digital divide - a social and technical point of view(Department of Computer Science and Engineering, University of Moratuwa., 2012) De Silva, HP; Siriwardana, TWRO; Somasiri, RPIT; Surasinghe, SAHB; Surendra, KHA; De Silva, RThe purpose of this literature review is to provide information about current status of digital divide, explore reasons for digital divide and issues rose on society and provide a summary of initiatives that can be taken to overcome digital divide. The scope is limited to explore ways of securing the needed infrastructure from a technical point of view and a social point of view.
- item: Conference-Full-textComputability in cryptography(Department of Computer Science and Engineering, University of Moratuwa., 2012) Iroshan, AKA; Indrajee, KHH; Mahawithana, P; Dharshana, KUGS; Premarathna, PHSR; De Silva, RCryptography is a concept and a methodology for secret communication, which is used and improved thousands of years. Cryptography includes a vast variety of implementation schemes, starting from simple shifting ciphers to DNA algorithms. In this paper we discuss extensively the algorithms behind those cryptographic schemes and the computability aspects of such algorithms. We outline the advantageous factors in computational complexity in such schemes. Also some interesting research being done on this area and problem areas where further research is needed, are outlined.
- item: Conference-Full-textComputers and intelligence: the brain, machine and intelligence(Department of Computer Science and Engineering, University of Moratuwa., 2012) Weerasinghe, BAJN; Weerasinghe, VP; Pirinthapan, M; Nanayakkara, DAU; Perera, LNPT; De Silva, RThis paper discusses on human mind and computer intelligence. It briefly discusses about the structure of the brain and explores how human brain can interact with machines using Brain Computer Interaction. Then the paper discusses about the origins of Artificial Intelligence, current state of Al, its applications and implications to the human society. The idea of "true human like intelligence" and the possibility of machines having such intelligence is explored.
- item: Conference-Full-textCopyright infringement of software(Department of Computer Science and Engineering, University of Moratuwa., 2012) Anicitus, PDDA; Dissanayake, MDAS; Jayawardena, SS; Lakjeewa, DM; Basnagoda, SNRThe evolutionary development of Information and Communication Technology has become a doubled edge knife since it has made human life console and easy, and at the same time unsafe and vulnerable. In this paper we have put an effort to search research and understand the means of copyright violation in software industry and methods of preventing.
- item: Conference-Full-textCSE Symposium 2012 - Pre Text(Department of Computer Science and Engineering, University of Moratuwa., 2012) De Silva, R
- item: Conference-Full-textCurrent trends in network design and implementation(Department of Computer Science and Engineering, University of Moratuwa., 2012) Wijesinghe, ASR; Nayanamith, I; Galappaththi, T; de Silva, KL; bandara, P; De Silva, RThis paper contains current trends in network design and implementation. This is a vast field. So this paper will discussed about this topic in several topics. Mobile industry, World Wide Web, Transition to IPv6 from IPv4 will talk in deep in this paper. People who want to know about currents trends in networking, this paper may be useful.
- item: Conference-Full-textEffectiveness of using ict in education(Department of Computer Science and Engineering, University of Moratuwa., 2012) De Silva, PHMP; De Silva, PH; De Vas Gunawardhana, APCJ; Pathirana, PPPS; Senarathna, USMThe globalization and the trend towards a knowledge-based economy emphasize the importance of using Information and Communications Technology (ICT) and elearning concepts in education. Currently many countries trying to adapt ICT in many aspects of their education systems. But in many cases, we hear that those attempts become failures due to various reasons such as poor infrastructure, lack of basic ICT knowledge, high cost in implementing the system for the first time in a country etc. This literature review focuses on how we can use ICT successfully in education. As our research topic is Effectiveness of using ICT in education, we studied some of the current systems used in various countries, the pros and cons of those available systems and the solutions they provided for the problems they have faced so far. Our view on those problems and solutions are discussed at the latter part of this paper.
- item: Conference-Full-textEnhancing communication through ict to improve livelihood of bop(Department of Computer Science and Engineering, University of Moratuwa., 2012) Kumara, MH; Kuruppu, KAMMN; Kumara, LAJ; Mapa, EB; Mannapperuma, DS; De Silva, RPoverty is a burning problem BOP societies. Since agriculture is the main occupation in most of rural areas, agricultural production and post-harvest activities mainly counted as their income which their lives will depend until the next harvests. Poor - health, natural disasters, education, lack of infrastructure, lack of financial services of rural areas hold the improvements of living standards. This paper analyze the possible ICT interventions that improve the general livelihoods of the rural poor that may also yield significant agricultural development investments on the part of rural families by making others aware of these issues that will provide the better policy deriving and make a better future for the BOP. ICT can be a powerful enabler of future goals because it helps to improve communication and the exchange of information to strengthen and create economic and social networks. It also can be applied to most of the human activities from personal use to business and government. This paper focus on integrating rural areas into global networks and making information, knowledge and culture available and also the possible ways of income generation and poverty reduction.
- item: Conference-Full-textKnowledge is power: ethical data mining(Department of Computer Science and Engineering, University of Moratuwa., 2012) Nawaratne, BKUR; Perera, JLPR; Perera, KDC; Perera, WPRM; Mangaleswaran, C; De Silva, RThis paper discusses what Ethical Data mining is and how significant it is for the current world. It describes how the information and data available can be used efficiently while ensuring the privacy of the information and data without any privacy violation. Thus it identifies the problems and implications associated with data mining and gives suggestions to practice ethical data mining.
- item: Conference-Full-textLocal language computing (language translation systems)(Department of Computer Science and Engineering, University of Moratuwa., 2012) Abeywickrama, HV; Dahanaykage, TPK; Dissanayakage, DMA; Ganegedara, KMTV; Ranawaka, RAU; De Silva, RLanguage undoubtedly is one of the most effective communication methods invented ever. But the difference between the languages used in different parts of the world has negatively affected the rapid development of Information and Communication Technology (ICT) considerable extent, resulting in a number of issues includi digital divide. This document brings to light the problems faced in Local Language Computing (LLC) such as the complexity of translation from one language, (basically English to another language) and information about the competed and ongoing research in this area. This review presents the findings of many researchers under a number of headings. First the document describes the main features of the Local Language Translators. Then it goes on to describe the main facts and concerns of implementing such a translator. The last part of the document consists of the importance of research when it comes to the topic of LLC. This document basically contains technical and other important details on the findings of some selected researches in the area of Local Language Computing.
- item: Conference-Full-textModem user input methods(Department of Computer Science and Engineering, University of Moratuwa., 2012) Weerasekara, WMTB; Rajaguru, RMCD; Chandrasena, DHDM; Ranasingha, NMTL; Ponnamperuma, SR; De Silva, RThe main objective of this research paper is to identify the modern technologies which are used to interact with computing devices and securing those input methods. Here, we mainly focus on modern aspects of the user input methods such as gestures, multi-sensors and motion detections devices rather than obsolete methods.
- item: Conference-Full-textModern cryptography: approaches and attacks(Department of Computer Science and Engineering, University of Moratuwa., 2012) Gurutharsan, N; Hareesan, R; Kanarupan, K; Rajkumar, R; Sathiyavarthan, S; De Silva, RInformation is in many forms and it is everywhere. Information is to be exchanged. At present communication systems are well developed and widely used There arise the issues regarding the Security Measurements The ‘security impose' tends to trade off with communication speed. Cryptography is the main methodology used in security enforcement over information exchanges. With time the requirements change and so does the approaches for cryptography. With fresh approaches there emerge new attacks. This paper tends to analyze the generalized approaches and attacks over time and it is restricted (only) to the Computer Era (computer and internet related cryptography)
- item: Conference-Full-textNetwork security: analysis of network crimes and data protection methodologies(Department of Computer Science and Engineering, University of Moratuwa., 2012) Adhikarinayake, CK; Baddegama, VW; Bandara, GM; Erabadda, ELBH; Senarathna, MSRConP^rs have replaced majority of file based systems. File shareing has become essntional for any company and for any individual with incerasing usuage of technology. systems to be successful. In this paper we have discussed how security of computer based systems can be threatened due to vanous reasons and how these threats can be minimized adopting various methodologies. We bring up current solutions implemented in the current world and some new the oretical designs. The paper is mainly focuses on the users at the endpoints of the network. The security aspect related to provide secured connections between them (data encryption, etc.) is not discussed in the paper.
- item: Conference-Full-textTechniques of effective web design for mobile and desktop applications(Department of Computer Science and Engineering, University of Moratuwa., 2012) Ariyarathna, AL; Dharmasiri, DDC; Jayendranath, HRR; Jayarathna, MSH; Perera, WPM; De Silva, RWith the invention of mobile web, World Wide Web is no longer limited to our desktops. The challenge is obviously to come up with web designs that would support web applications via mobile web browsing as well as personal computer based web browsing. In this paper we propose a model to unify the mobile and desktop web application development which will make the development easier and deliver the user with a satisfying user experience.
- item: Conference-Full-textWeb 2.0 technologies as tools for distance learning(Department of Computer Science and Engineering, University of Moratuwa., 2012) Murugamoorthy, M; Panditha, A; Pathiranage, ADLV; Sandamal, LC; Weerasinghe, PSL; Wijesiri, TIII; De Silva, RThis paper provides an analysis of the current status in enabling distance learning via web highlights its limitations and problems.
- item: Conference-Full-textWhy is the ipad popular?(Department of Computer Science and Engineering, University of Moratuwa., 2012) Abeyweera, AL; Amarasinghe, GN; De Silva, MDH; Jenanamhan, Y; Rathnayake, RMS; De Silva, RApple is more than just an induct they are innovators at their very core. They don't modified their technology or the technology of their competitors they invent technology. The apple products are sleek, stylish and are focused focused towards everyday user. With the apple "app-store technology the use-fullness of the devices grows exponentially Above all, the products are marketed exceptionally well with their very own marketing strategy. So why is the iPad so popular? It is no surprise that the apple’s unique marketing philosophy and the faithful customer base contributes largely towards the fact. It is a combination of the device’s physical aspects and the application store that makes iPad the most sought after device on the market today.