Master of Science in Telecommunications
Permanent URI for this collectionhttp://192.248.9.226/handle/123/60
Browse
Recent Submissions
- item: Thesis-Full-textAn Energy efficient D2D communication model with guaranteed QoS for cloud radio access networks(2020) Ranawaka IJ; Samarasinghe T; Hemachandra KThis work proposes a spectrum selection scheme and a transmit power minimization scheme for a device-to-device (D2D) network cross-laid with a cloud radio access network (CRAN). The D2D communications are allowed as an overlay to the CRAN as well as in the unlicensed industrial, scienti c and medical radio (ISM) band. A link distance based spectrum selection scheme is proposed and closed-form approximations are derived for the link distance thresh- olds to select the operating band of the D2D users. Furthermore, analytical expressions are derived to calculate the minimum required transmit power to achieve a guaranteed level of quality of service in each operating band. The results demonstrate that the proposed scheme achieves nearly 50% power saving compared to a monolithic (purely overlay or purely ISM band) D2D network. Moreover, this work creates an immense space for communication tech- nologies to be wisely managed and utilized by application layer requirements through CRAN architecture. Caching strategies for content replication across end user devices and e ective content delivery strategies can be implemented for forthcoming video streaming applications.
- item: Thesis-Full-textCross-relation-based frequency domain blind channel estimation for MIMO communication systemsRathnasiri, HHS; Wavegedara, CBlind channel estimation is attractive for the application of in high-speed wireless communication systems due to its high spectral efficiency. Most of the conventional blind channel identification algorithms are based on the statistical properties of the transmitted signals. However, in practical communication systems, the statistical model of the transmitted signals may not be known or there may not be sufficient data to estimate the statistical properties. Alternatively, we can use Cross Relation (CR) principle for computationally-efficient blind channel estimation. CR principlebased frequency domain blind channel estimation schemes offer good performance when the data length is inevitably short. In this thesis, a frequency-domain CR-based blind channel estimation schemes are developed for both single-carrier and multicarrier multiple-input multiple-output (MIMO) systems. The proposed channel estimation scheme is able to identify the channel using a single received signal block. This channel estimation scheme is accompanied by a simple block pre-coding scheme. The channel is assumed time invariant within the signal block period which depends on the antenna configuration ofthe system. The numerical simulation shows that the proposed methods perform satisfactorily with only one or very few received signal blocks, with compared to existing correlation based methods which require more data blocks.
- item: Thesis-AbstractAn MMSE-based MCI and MAI cancellation receiver for MIMO OVSF-OFCDMA systemsKumara, NK; Wevagedara, KCBBroadband orthogonal frequency code division multiple access (OFCDMA) with two dimensional spreading is a promising candidate for Beyond fourth Generation (B4G) networks. Since wideband channels are highly frequency-selective, orthogonality among orthogonal spreading codes are no longer maintained. Therefore, multiple code interference (MCI) is inevitable in OFCDMA-based systems. Multiple-Input Multiple-Output (MIMO) will be a key technology of future wireless communication systems. In MIMO-OFCDMA systems, in addition to MCI, inter-spatial stream interference (ISSI) will also exist. Even though maximum a posteriori probability (MAP)-based detectors provide the best performance, their computational complexity is high. Alternatively, minimum mean-square error (MMSE) detectors can be used to obtain a better tradeoff between the complexity and the performance. ; Several interference cancellation techniques were proposed under LTE Advanced, B4G standardizations and corresponding literature. One such technique is zero-forcing MAI nulling and cancellation based on QR decomposition (ZF-QRD). That can be used to cancel the MAI separately. But we are proposing a combined ISSI and MCI cancellation technique. We also compare the performance of MIMO VSFOFCDMA recursive ISSI and MCI cancellation scheme with conventional MC-CDMA, MC-DS-CDMA, MT-CDMA and OFCDMA.
- item: Thesis-Full-textPolicy framework and recommendations to minimize the usage of substandard, counterfeit and stolen mobile communication devices(2019) Saputhanthri AP; Samarasinghe ATLKTelecommunication sector is one of the technologically advanced sectors, globally. The mobile device market is always growing and it is very competitive. Counterfeit and substandard devices are collectively known as black market devices. Availability of black market and stolen mobile devices is a global issue. When buying a mobile device, most of the people focus on cost, brand and model. The important factors that represent the standard of mobile devices such as validity of International Mobile Equipment Identity (IMEI) and the Specific Absorption Rate (SAR) value are neglected. It is important to adhere to a proper policy framework and introduce systems such as Equipment Identity Registers (EIRs) to minimize the usage of black market and stolen mobile communication devices. Mobile device blocking and regulation have become difficult tasks due to the unavailability of proper systems and policies. This has allowed stolen and black market mobile device usage. As per the user survey conclusions, it was identified that user behavior patterns, limitations of existing EIR and prevailing policies should be changed to address the issue. A policy framework that includes the steps of increasing user awareness, establishing a proper blocking mechanism and adding reforms to regulations is recommended as a solution.
- item: Thesis-Full-textSpectrum Management policy framework for mobile broadband in Sri Lanka(2019) Nagasinghe AI; Samarasinghe ATLKSpectrum management has become an important aspect of regulation as part of industry broadband growth and foster innovation. The statutory framework that exists currently in Sri Lanka for mobile broadband spectrum management is elementary and outdated. Therefore, the current regulations fall short of driving the exponential broadband growth in the telecommunications industry, promoting investment and innovation in the provision of services which ultimately results the consumers to use poor quality broadband services and products. This research is mainly focused to identify the most suitable spectrum policy changes required to foster the mobile broadband growth in Sri Lanka; solutions to the existing spectrum management problems, what steps need to be taken to be taken to avoid these problems in the future; What actions need to be taken to foster innovation and spectrum best practices around the globe. There are few steps used to gather information for the policy framework. A survey was conducted among the all mobile operators/TRCSL/Main equipment vendors covering the 360 landscape of the mobile telecommunication industry in Sri Lanka. Then a study was done about the already implemented broadband policy frameworks in south Asian developed countries. And also, it was thoroughly analyzed the spectrum policy frameworks introduced by ITU and regional regulators Finally, spectrum policy recommendations to Sri Lankan industry context were suggested in three main pillars of spectrum policy concepts namely Spectrum Planning, Spectrum Management and Spectrum Licensing with each concept having three main areas of study.
- item: Thesis-Full-textAn Iterative capacity dimensioning scheme for an LTE advanced network under resource constraints(2019) Chandimal KGN; Wavegedara C; Samarasinghe TSince the need for high-speed broadband services is growing exponentially, legacy voice oriented networks are now becoming obsolete. Due to the unceasing demand for data, investors of mobile service providing companies are also keener on investing new technologies other than GSM, which ultimately improves spectrum efficiency and speeds up the access. Long Term Evolution (LTE) is the fastest and latest broadband technology with widespread global development of commercial networks. Until now, scientists are working to improve the communication capabilities while evolving from basic voice services to high definition video streaming and real time video game playing. However, every operator has a limited investment capacity and are highly concerned about the maximum utilization of resources with a higher ROI. As a result, it is imperative to have a properly dimensioned and well-optimized network. However, LTE network dimensioning is not as easy as legacy pure voice-only networks (circuit switched), which can be easily modeled by Erlang formulae. LTE networks are evolving from circuit switching to packet switching; therefore, both voice and data will be transferred as packets. There can be combinations of different data service requirements such as streaming, browsing, interactive video, gaming etc. with voice. In fact, different types of traffic, which require different QoS are inherent. With the new releases of LTE standards, researchers all over the world are interested in finding most optimum ways of dimensioning LTE networks. Several perspectives have looked at calculating the required number of 4G sites in the initial network-planning phase. Even though there are quality-based models, coverage based models, capacity based models and hybrid models already, due to the complexity of both UL and DL throughput calculations, each model has its own advantages and disadvantages. None of the approaches are discussing about an iterative capacity dimensioning solution to fine tune the required site count. Therefore, in this research thesis author proposes an iterative method under constraints to find the minimum site count while achieving given UL/DL speed requirements for LTE network rollouts. This method will be based on iterations, and varying parameters will be heavily significant in the context of DL and UL throughput.
- item: Thesis-Full-textK-best sphere detector based receiver for mimo non-orthogonal multiple access systems(2019) Ranaweera NNS; Wavegedara KCB; Samarasinghe TNon-Orthogonal Multiple Access (NOMA) is a promising radio access technology, which improves the spectrum efficiency and system throughput considerably over conventional Orthogonal Multiple Access (OMA) techniques and also enables massive connectivity. NOMA is currently being considered extensively as a key enabling technology for 5G wireless networks. However, in NOMA, one of the key technical challenges is to develop efficient receivers due to the presence of Multiple-Access Interference (MAI) caused by non-orthogonal resource allocation. Minimum Mean Square Error (MMSE) based Successive Interference Cancellation (SIC) receivers have widely been discussed in the literature for power-domain NOMA systems. However MMSE detector is a linear detector with poor error performance. In this research, a K-Best sphere detector based SIC receiver is discussed for the downlink of power-domain MIMO-NOMA systems. The BER performance of the proposed receiver is investigated for different power allocation ratios and for different K values of the K-Best detector. Link level simulation results demonstrate that our proposed K-Best detector based receiver offers much superior performance over the MMSE-SIC based receiver.
- item: Thesis-Full-textKnowledge management framework for mobile telecommunication sector in Sri LankaNadeera, J; Samarasinghe, KSri Lankan mobile telecommunication industry is a fiercely competitive market space where five key mobile service companies operate. Most operators provide their services island wide; therefore the coverage footprint is no longer a differentiating factor. On the other hand, knowledge is a tool, which companies can use to provide a better service quality, which is now in demand with customers. Due to globalization and increasing opportunities for individuals, companies face a challenge to retain best employees within the organization. Now the focus has shifted to keep the knowledge within the organization even with the movement of skilled labor. Therefore, knowledge management systems are necessary than ever before, but a most suitable knowledge management framework is yet to be identified. The objective of this study was to determine a most appropriate Knowledge Management Framework for Mobile telecommunication sector in Sri Lanka. To realize this goal, initially, a literature survey was performed. The Author analyzed various knowledge management models available and best global practices of knowledge management aspects. It revealed six key concept variables, i.e. socialization, externalization, combination, internalization, knowledge sharing culture, and leadership. Next, an online survey tested these concepts to find the importance and current practices in the mobile telecommunication industry in Sri Lanka. This study identified that all the six concept variables were relevant to Sri Lankan context, while externalization, combination, and internalization practices were at a lower level. Finally, a knowledge management framework suitable for mobile telecommunication industry in Sri Lanka was developed.
- item: Thesis-Full-textGeo based routing for border gateway protocol in ISP multi-homing environmentThilakarathne, D; Pasqual, ABGP is the one and only protocol used by ISPs to exchange routing information between Autonomous Systems. An Autonomous System is an IP network or group of IP networks under a common administration with common routing policies. Internet Service Providers (ISP) connects to each other to facilitate reachability among Autonomous Systems using BGP protocol. Many ISPs setup multiple upstream connections to achieve global connectivity, redundancy, and a better quality of service. Multiple upstream connectivity results multiple paths to destinations. ISPs need to apply complex route policies to select the best outgoing interface to destination among multiple paths since BGP protocol does not consider link congestion, and distance to destination during the route selection process. Incorrect path selection leads to unnecessary traffic route between autonomous systems, high latency and low quality of service. Most prevailing issue for the South Asian internet users is that Internet content is not hosted within the region but in Singapore, Europe, and USA data centers. BGP protocol does not select shortest distance always when multiple upstream connections are available to ISP. This results in high latency to the end users. We can simulate different ISP path delays by introducing delay element between end server and client terminal. This proposal provides experimental results on how end user experience varies when delay to end server varies. Delay is proportional to distance between user terminal and end server. Therefore, this proposal considers distance to end server when solution is proposed to optimize end user delay. Traditional BGP does not consider geographical distance to end server when selecting outgoing interface. BGP has thirteen criteria to select best outgoing interface but most dominant criteria is the AS-PATH length. This research focuses on equal AS path length occurrences of current full BGP routing table in multi-homing environment. Equal AS-PATH length results BGP protocol to select outgoing interface randomly based on lowest router ID or lowest interface ID. The proposal suggests using geo graphic distance to destination as tiebreak condition for equal AS-PATH. This enables BGP itself to calculate best path without using complex routing policies. BGP is a heavily adopted protocol in the internet domain. It is hard to change such a stable implementation to achieve proposed geo based routing. SDN based implementation proposes in this proposal since SDN implementation is becoming popular in IP networking domain. New route selection criteria for BGP can easily implement using SDN controller. Simulation results reveal approximately 50 percent of the routing decisions are based on equal AS-PATH length if special routing policies are not applied. Further, simulation result justifies a relationship between latency and web page browsing user experience.
- item: Thesis-Full-textNational broadband strategies for Sri LankaJayalath, MB; Samarasinghe, KObjective of this study was to propose a set of national broadband strategies that suits to Sri Lankan context. Strategic planning process is used as the model to build up national broadband strategies. Initial step of the model is to set some strategic objectives. Therefore, set of strategic objectives, goals, targets for broadband were proposed. It is required to conduct an environmental scanning process which can be used to identify internal and external factors of the broadband environment. Environmental scanning process was done by a questionnaire which was administered among industry personnel and also the face to face interviews were carried out with government body personnel which represented from TRCSL and ICTA. Interviews which were carried out, revealed about existing broadband strategies and also the national broadband policy which has been drafted by a committee of broadband experts. Then the set of broadband plans were formulated and proposed and output of literature was used a platform to build up broadband plans. Literature survey was carried as an analysis of approaches that leading countries have taken in expanding their broadband markets, with a focus on the Republic of Korea. In addition, case studies covered Finland, France, Japan and the United States. Another case study of broadband implementation of Nigeria was also discussed in literature survey. Then this study revealed some set of broadband initiatives and policies that can be aligned with broadband plans. Those initiatives and policies are validated by the outcome of the literature survey and the discussion which had with government body personnel.
- item: Thesis-Full-textA Suitable ICT policy framework for Sri Lanka - licensing, interconnection and spectrum management aspectsWijesinghe, A; Samarasinghe, KA Suitable ICT Policy Framework for Sri Lanka - Licensing, Interconnection and Spectrum Management Aspects World ICT industry is rapidly changing over time and most significant aspect that can be seen is the convergence of telecommunications, broadcasting, IT and content. With this change in technology as well as industry, regulation of them is becoming more and more important in order to pass the maximum benefit to the general users. Regulation depends on policy towards the industry, hence a strong policy stance is vital for any country to reap the real value of ICT. In Sri Lankan context, regulatory convergence has not yet taken place. Also Sri Lanka has no clear strategy on how to use ICT for its economic and social development. Moreover, Sri Lankan ICT policy must be strengthen on addressing universal access and overcoming digital divide. A literature survey was carried out to identify what is policy, public policy formulation, importance of ICT policy to a country and relationship between policy and regulation. ICT policies and legislations of selected countries were then examined. Next, the expected benefits for the Sri Lankan economy and society as a whole from the ICT sector was looked at. Finally a policy framework was recommended to Sri Lanka to achieve the long term goals. These recommendations were also discussed and got validated from the Regulator. Sri Lanka targets to achieve economic and social development through promoting ICT industry. In order to achieve that industry must be regulated in a converged manner through a single body, correct level of competition to be maintained and each sector to be regulated at appropriate level. It is recommended that international standard to be followed in spectrum allocation and bandwidths are given for research activities. Local interconnection must be handled through regulatory intervention, while outside connections are also to be aggressively looked at.
- item: Thesis-Full-textPolicy and regulatory framework for NGN interconnection in Sri Lanka(2016-09-17) Siwantha, N.G.S.; Samarasinghe, KPolicy and regulatory framework for NGN interconnection in Sri Lanka The NGN represents a synthesis of existing world of the traditional Public Switched Telephone Network (PSTN) with the world of the Internet. The economic and regulatory arrangements for the two have historically been very different. Many of the networks created over the past ten years contain most of the key elements of an NGN. Most, if not all, of the technology necessary for IP-based NGN interconnection has been available for five to ten years. Advanced approaches to interconnection have been slow to deploy, even where the technology has been mature or within hailing distance of maturity. In order to propose a regulatory and policy framework to interconnect NGN in Sri Lanka, it is analyzed existing technologies, standards, and practices of other countries and regions. It is analyzed the future telecommunication trends and impact to the new NGN interconnection model from those future trends. The current interconnection model and future predicted network structure in Sri Lanka is analyzed in order to make sure the proposing interconnection structure is a future proof one. It is selected one major mobile telecommunication operator in Sri Lanka and analyzed the characteristics of traffic distribution. It can be identified that traffic distribution of selected operator is correlated with population distribution in Sri Lanka. Therefore it is proposed a new interconnection topology to Sri Lanka based on that traffic analysis. It can be identified that more than 50% of traffic is originated and terminated in same region. Therefore it is proposed five regional interconnection hubs with ENUM registries for Sri Lanka. Interconnection hubs are positioned at population centers not in geographical centers. It is proposed to mandate every operator to connect in to interconnection hub. Interconnection hub will be managed by TRCSL as independent non for profit entity. The view of TRCSL on proposed model and regulatory framework is taken and analyzed at the end.
- item: Thesis-Full-textFeasibility study on mobile number portability implementation in Sri Lanka(2016-09-17) Hatharaliyadda, CB; Samarasinghe, ATLKMobile telephone number is considered as a great asset to a mobile telephone user. Generally subscribers are reluctant to change their mobile telephone number as it requires him to communicate about his movement to each and every potential person that is trying to reach him via his mobile telephone. Mobile number portability is a network function that allows mobile subscriber to switch service provider while retaining the mobile telephone number. Many countries have implemented MNP services in their telecommunication network to date. In this research study the necessity and subscriber willingness to accept MNP services implemented in Sri Lankan telecommunication market was tested through a mobile subscriber survey. In addition statistics on reasons for subscriber churn and some demographic aspects of subscribers those are willing to accept MNP services also analyzed through the responses collected on survey. Different MNP implementation architectures were analyzed in detailed with call flows. Advantages and disadvantages of each implementation architectures was identified and compared. The list of modification required in mobile service provider’s core network under each architecture was identified and feasibility of implementing each architecture was discussed with mobile telecom service providers in Sri Lanka. Analysis and comparison of costs involved in each different MNP implementation architecture was performed. The recommendations on implementable MNP architecture was given based on the feasibility and cost analysis using the statistics prediction made through subscriber survey.
- item: Thesis-Full-textDevelopment of a quality of service (QOS) policy framework for mobile broadband services in Sri Lanka(2016-09-17) Konara, DG; Samarasinghe, KDevelopment of a QoS Policy Framework for Mobile Broadband Services in Sri Lanka Quality of Service (QoS) has become an important aspect of regulation as part of industry monitoring and consumer protection objectives. The statutory framework that exists currently in Sri Lanka for mobile broadband QoS regulation is elementary, outdated and no proper monitoring mechanism in relation to the telecommunications environment today. Therefore, the current regulations falls short of driving improvements in quality of service in the telecommunications industry, promoting investment and innovation in the provision of services, and empowering consumers to make informed decisions about the choice of services and service providers. This research is mainly focused to identify the most suitable parameters required to measure the broadband QoS in mobile telecommunication; define target values for those parameters; define the procedures to get the measurements and define the auditing procedures for the regulator. There are few steps used to gather information for the policy framework. A survey was conducted among the professional in mobile telecommunication industry in Sri Lanka as the premier step. Then a study was done about the already implemented broadband policy frameworks in other countries. And also, it was thoroughly followed the definitions and standard introduced by ITU and ETSI. Finally seven QoS parameters were identified which are suitable for the proposed QoS policy framework and defined their target values. The measurements for three parameters have to get from live tests and remaining four can be calculated from the network tools already used by the operators. Therefore first three measurements should be taken by the regulator and remainings should be taken by the operator and required to send them to the regulator. It is proposed to do these testings once a month and the regulator should do an audit once a quarter for each and every operator.
- item: Thesis-AbstractEvaluation of EM exposure from wireless communication devices in a household environmnt(2016-05-30) Ariyaratne, TRCO; Samarasinghe, ATLKWith the increasing usage of wireless devices in households, the magnitude of exposure is explored when multiple such devices are used simultaneously. Out of many wireless devices found in a typical house, the study is limited to three common applications: Mobile Communication (GSM 900 MHz, GSM 1800 MHz and WCDMA 2100 MHz), Wi-Fi Communication (2400 MHz) and Cordless System Communication (1900 MHz). The necessary data samples were collected from a household environment and SAR calculations were performed. An indoor wireless propagation simulation was carried out to visualize the existing radio environment under wireless transmission. It is shown that effects of simultaneous exposure can increase the level of harmfulness.
- item: Thesis-AbstractIntuitive reasoning for epistemic uncertainty(2016-05-25) Senaratne, DN; Pasqual, AA; Jayasinghe, JAKS; Kulasekera, ECEpistemic uncertainty, characterized by subjectiveness and partial availability of information, is associated with the domains of multi-sensor fusion, evidence processing, etc. Mathernatical Theory of Evidence, pioneered by Glenn Shafer [1], is a branch of study seeking to analytically model and manipulate the epistemic uncertainty entertained by an agent. The field is relatively young and cluttered with schemes that are used non-cohesively and often counter-intuitively. Further the issue is made worse as none of the schemes seems to be capable of modeling fully the uncertainty met in practice. Interestingly, humans are capable of intuitively handling such uncertainty in statements in their day-to-day activities. It is apparent that the reasons for deficiencies in existing models is the unjustified nature of their application approaches. This research seeks to enhance the intuitiveness and flexibility in mathematical modeling of epistemic uncertainty. It identifies three aspects, which any model should address cautiously. Namely, the manner in which real world propositions are mathematically represented, the manner in which uncertainty entertained by an agent is conveyed as a number assignment, and the manner in which expressed uncertainty is combined and conditioned. Novel strategies that parallels the way humans reason and hence enhance the intuitiveness, are introduced to overcome shortcomings in the existing mathematical representation. Further it proposes representing support as functions of propositions which are formed using a Boolean algebra on a set of hypotheses representing the context. Handling of some complicated propositions is simplified by introducing N-of, a logical operator formalizing the human notion 'N of n'. The research also proposes methods that can be used to select an appropriate combination strategy based on the contextual relationships between the frames, for a given evidence. It is further noted that the counter intuitive results obtained using the existing combination function's is a direct consequence of one being unaware of this relationship. Latter part of the research focuses on the concept of pre-conditioning, where evidence is conditioned based on external information one deems as certain. It also examines how comparable evidence may be averaged based on pre-determined weights. Although, a couple of novel concepts are introduced, the concepts retains backward compatibility with what is already established in this domain. Being modular, the proposed schemes can be selectively integrated with the existing techniques.
- item: Thesis-AbstractInvestigation of methods to develop a system for human psychological state detection(2015-09-18) Ranathunga, RAMP; Samarasinghe, ATLKStress is considered a major concern of the modem world as it negatively impacts social stability by hindering performance, efficiency and overall health of people. It is the leading cause of serious life threatening diseases such as heart disease, stroke, high blood pressure, cancer and many psychological disorders. Therefore solutions are constantly researched as it has become a severe issue in the fast paced world especially western nations where they have encountered drastic consequences. The only solution that can counteract stress is relaxation. The western approach to stress management is mainly through psychotherapy and external stimuli such as brain synchronous music, while the eastern approach tends to go into deeper relaxation through meditation. It's not possible to detect stressed/relaxed psychological states directly, it is essential to study the physiological cues through which it manifest in order to detect it. According to literature different research studies have used cues Heart Rate Variation (HRV), skin temperature, Galvanic skin response, Respiration patterns, Electroencephalography (EEG) as physiological cues, however very few research studies have been carried out focusing on physiological effects of eastern relaxation techniques. Heart rate and Electroencephalography (EEG) were selected as physiological variables during this research and most importantly both western and eastern approaches to relaxation have been analysed together with counterpart stress. Stressed state triggered using arithmetic stressors and stressful videos while relaxed state generated by meditation and relaxation music. Nonin 4100 pulse oxymeter and Emotiv EEG headset were respectively used for capturing raw heart rate and EEG signals. Fourier techniques have been widely used while wavelet techniques have been occasionally used for Heart rate and EEG data processing as per the literature, decided to proceed with wavelet packet decomposition as it allowed both frequency and time localization of the signal with much reasonable accuracy. Matlab together with EEGLAB was used as the data processing tool during entire research. Heart Rate signals' Power characteristics of Low Frequency (0.04 - O.1S Hz) and High Frequency (O.lS - O.S Hz) bands, which correspond to sympathetic and parasympathetic activities were analyzed. Further power characteristics of Delta, Alpha, Beta and Gamma rhythms of EEG singals were analyzed for each test case, each channel. The results of the experiments were in par with the results suggested by current literature for common stress and relaxation test cases, importantly additional test case meditation triggered high power in Alpha EEG rhythm and high frequency band of Heart rate signals. It was possible to identify that db2 (sym2), dbS, sym7, coiflets4 and coifletsS wavelets can be used for heart rate based analysis, in addition to db4 & dbS which were used in literature. Noticed that the EEG channels corresponding to occipital regions are the best channel locations that have to be analyzed to identify psychological state, while it's possible to use db6, db7, dbS coif2, coif3, coif4, coifS, symS, sym6, sym7 and symS wavelets in addition to db4 and dbS which were generally used in literature for EEG related analysis. Accuracy of the test setup can be further improved by incorporating more physiological cues and by identifying best techniques for filtering, rejecting artifacts of EEG signals. Further, state identification process needs to be automated while integrating a data mining tool to convert setup to a real-time psychological state detection and management tool. Abstract
- item: Thesis-AbstractDeveloping a strategy and an open module for N-SBC to eliminate DDOS attacks from sip based NGN IP interconnections(2015-09-18) Weerasinghe, SN; Samarasinghe, KThe Session Initiation Protocol (SIP) is the communication protocol of the future. Used for Voice-over-IP (VoIP), Internet Multimedia Subsystem (IMS) and Internet Protocol Television (IPTV), SIP's concepts are based on mature and open standards and it is usage is increasing rapidly. However, with its acceptance as a mainstream communication platform, security concerns become ever more important for users and service providers. Usage of SIP for communication is currently spreading into the last mile of mobile and fixed line carriers making then very much vulnerable to the protocols ofthe internet domain. The posed threat can be understood by the increasing number of calls being initiated from the internet to mobile and fixed line devices. At the crust, in order to manage the threats coming in from the internet, operators usually go for tighter Security in the Session Boarder Gateway (SBC), the interface between internet and the operator's domain. Furthermore, rogue attempts to infiltrate the Operator's domain is now becoming a common occurrence and leading to losses beyond billions of dollars of revenue. Irony is that Operator's sometimes does not understand the scale of the exploitation until much later in the billing cycle. This thesis identifies the probable modes of attacks including DoS and DDoS, and provides a strategy and an implementation plan to identify these threats via pattern matching and heuristic logic which is built on leaning algorithms. Target is to introduce a solution capable of learning and identifying patterns which leads to DoS, DDoS attacks and eliminate the rogue communication threads from ever entering the realms of the operator. With this solution, general VOIP communications with Operators shall be more robust against DoS and Distributed DoS attacks and many other threats looming at the N-SBS level of an NGN network.
- item: Thesis-AbstractSpace diversity model for field monitoring systems deployed in agriculture(2015-09-18) Kumara, WSLR; Samarasinghe, KWith the rapid technical development, advance technical concepts are applied to enhance the efficient of agriculture sector. One of the key technical concepts is field monitoring networks. Today wired & wireless networks are mainly deployed on agriculture fields. Different kind of information such as temperature, relative humidity, wind speed, wind direction, soil moisture, CO2 concentration, illumination, leaf wetness, PH indication of soil, light intensity and rainfall volume has been collected and sent to analyzing central office over this network. There is huge barrier to increase reliability of this network due to lack of power on these fields. To improve reliability of network, it needs some time complex operations, high end error control coding mechanisms. It will lead uncertainty on node, since node is running with low power. Improve the field monitoring network reliability without exceeding exciting power consumption of sensor nodes. Space diversity model based on multiple data collection points instead of single data collection point has been introduced to proposed network model. The new algorithms have been introduced under the thesis on data link layer, network layer and application layer. Rest of the things, which are not defined under this thesis, is followed IEEE 802.15.4 specifications. Different data combining techniques such as selective gain combining, equal gain combining & maximal ratio combining have been analyzed over different fading mechanisms such as Rayleigh, Rician & Gaussian on top MathLab 7.0 environment under different routing strategies on field monitoring network. For each simulation, BER vs. EblNo has been taken as output and completed the comparison. Finally it is proofed that, the performance on EblNo & reliability of field monitoring network can be increased with using this space diversity model based on two data collection points with maximal ratio combining on data collection server. Further, this model can be increased up
- item: Thesis-AbstractA security framework for organizations in implementing systems on the cloud(2015-09-18) De Abrew, KNT; Pasqual, AOver the last decade the cloud has created a major impact on the global IT ecosystem. Due to positive characteristics such as fast deployment, scalability, cost effectiveness and many more, cloud implementations are growing by the day. However security remains the number one barrier in cloud adoption for CIOs as per several surveys conducted on cloud adoption. When considering the research done on cloud security, most have focused on the security dependency according to the cloud service model (IaaS, PaaS, SaaS), and the cloud deployment models(Public, Private, Hybrid, Community). Research has also been done on security issues inherent to cloud deployments and how to overcome them. The Cloud Security Alliance (CSA), one of the leading organizations on cloud security together with the IEEE as presented 12 domains of cloud security that should be focused on, six of the domains would be considered as the base guidelines. The motivation behind this research was to provide a set of security guidelines and processes for local IT firms to adhere to when migrating to the cloud, in order to improve cloud adoption. The research was based on six domains of security provided by the CSA and security guidelines were developed along with the input of additional resources and security incidents. A step by step process for security assessment and implementation are presented along with security risk assessment matrix that will aid an organization to decide which resources are to be migrated to the cloud. The main contribution from