ERU - 2012
Permanent URI for this collectionhttp://192.248.9.226/handle/123/14689
Browse
Recent Submissions
- item: Conference-Full-textProceedings of the 18th Annual Research Symposium 2013 [Pre Text](The Engineering Research Unit, University of Moratuwa, 2013-02) Rodrigo, R
- item: Conference-Full-textForevidizer: forensic video & image analyzing toolkit(The Engineering Research Unit, University of Moratuwa, 2013-02) Wijayasiri, A; Sampath, C; Rathnayaka, N; Jayaweera, R; De Silva, C; Rodrigo, RDigital videos and images have become a common thing in life. More and more sophisticated tools are becoming available for the general consumers. With the advancement of digital image processing and video processing technologies, various kinds of images and videos are produced from different perspectives. As a result videos can be used for various frauds and illegal activities. Legislative changes have been made to accept videos and images from digital cameras as witnesses for legal proceedings. Consequently there is a growing interest in forensic analysis of video content where the integrity of digital images and videos need to be checked. In this respect it has become essential to have a proper toolkit to analyze whether a particular video is a real one or one that has been tampered with. As video editing techniques are getting very sophisticated, tampered videos are hard to detect. However, when a video is tampered with, some of the basic properties of the video are changed. Then to detect those changes it is needed to use complex image processing and video processing techniques and algorithms. We present methods to analyze these properties of a given video, and produce statistical details for the video to ascertain whether it is tampered with or not, and if it is tampered with then what changes have been made. Video frame duplicate detection, video double MPEG compression detection, image double JPEG compression detection and duplicated regions within image detection are the basic methods of forgery detections.
- item: Conference-Full-textBeyond the traditional telecom promotions, with the escalating customer Base(The Engineering Research Unit, University of Moratuwa, 2013-02) Jayawardhana, MKPR; Kumara, PAKM; Perera, TDK; Paranawithana, WDAI; Anjitha, T; Weerawarana, SM; Rodrigo, RThrough the past years, traditional telecom customer base has escalated with wide usage of mobiles. But the services and promotions offered by the service providers has been limited to a specific frame, without extracting useful information from the data they gather with each call. Specifically in mobile user segment, there is lot of data available for the service provider other than the credit balance to consider in giving away service and promotions. Among many reasons, a barrier for this is the technical feasibility. With the growing customer base and elastic behavior of network usage with the time and seasons, proposing an effective way of available data analyzing is challenging. It becomes more challenging when the results are required in near real time for the promotion to be of use. With this research studyt we discuss and compare the available technologies to be used, propose a system with the most appropriate technologies and express the results gained with an implemented prototype ‘Kanthaka'.
- item: Conference-Full-textDistributed intelligence as anlnformation retrievalsystem(The Engineering Research Unit, University of Moratuwa, 2013-02) Jayathilake, DSP; Herath, HMST; Wimalasooriya, RDDP; Karunarathne, SDJ; Weerawardhane, S; Rodrigo, Rsuch as Geographic Information Systems (CIS), because accurate information of geographic data a spat,ally distributed and vast in volume. The challenge is to improve the process of information retrieval, which can be applied to varying contexts such as GIS, going beyond the limits imposed by the knowledge base centric approaches. Social networks possess a vast amount of unstructured knowledge in its user base, which can be use in a awing interesting patterns, if analyzed in a systematic approach. In this paper, we emphasize on an approach for information search and retrieval, bv combining the social network of human intelligence and knowledge bases of information. Users of the system can present natural language queries, and questions be directed to relevant experts within the social network. Distributed information retrieval and information fusion is applied to optimize the process oj single answer generation. The feasibility of our proposed architecture is investigated by implementing a QA(Question Answering) system on a social network as a proof of concept. The Question Answering System is based on geogi aphic queries which will be directed to relevant users within the network to gather answers. Varying methods of information fusion and Natural Language Processing have been researched and discussed to discover the suitable approaches for generation. With the wide acceptance of the social networking paradigm and sharing of information, this approach be extended to other domains as well.
- item: Conference-Full-textSiyapath : a p2p gossip based volunteer computing framework(The Engineering Research Unit, University of Moratuwa, 2013-02) Silva, WGHAM; Hewage, N; Dhanushka, WDM; Nufail, MNM; Nanayakkara, V; Perera, S; Rodrigo, RThis paper presents Siyapath, a distributed volunteer computing framework prototype. It takes a novel approach in solving the problem of increasing demand for high performance computing. High performance computing addresses the demands on computationally intensive tasks. Volunteer computing is one approach to address the high performance computing requirements. Volunteer computing uses computational power volunteered by the general public, to perform computationally intensive tasks in a distributed manner. A volunteer computing framework provides the infrastructure for a volunteer computing network to operate. The solution presented, Siyapath, is a peer-to-peer, gossip based volunteer computing framework. Existing volunteer computing framework implementations are discussed in (his paper, along with their pitfalls and fallacies. The peer-to-peer architecture was incorporated into Siyapath with the intention of overcoming drawbacks present in volunteer computing frameworks based on a client-server architecture. Siyapath the functionality provided by Apache Thrift as a cross-language services development framework and gossip based protocol for communication. How Thrift and gossip based protocols help to improve the performance of the framework is also discussed. A proof-of-concept implementation of Siyapath has been completed which comprises of the basic functionality of a volunteer computing framework. Details of this design and implementation are described in the paper. Performance tests including a load test and a scalability test have been carried out to measure how the framework performs as the network scales. In the latter part of the paper, the results of the tests are presented and analyzed.
- item: Conference-Full-textFlight search optimisation using in-memory data management(The Engineering Research Unit, University of Moratuwa, 2013-02) Dimithrie, PS; Dias, GIn current travel planning systems, even for a relatively straightforward round-trip query, it is not uncommon to spend more than 30 seconds. If the results can be produced as quickly as possible it will resu in a competitive advantage in the market since the delay is undesirable for the user of the system as it reduces inter activity. Traditionally, data will be placed in storage then, when needed, will be accessed and acted upon in the computer's memory which results in a natural bottleneck that reduces speed. iti tic emergence of multi-core processors and availability of large amounts of main memory> at low cost new breakthroughs in the sofrware industry such as in-memory technologyt are being created. In-memoiy and multicore technology> have the potential to improve the performance. If all data can be stored in the main memory instead of on disk, the performance of operations on data, especially on mass data, is improved. In this paper it is intended to take the advantage of in memory technology , where all the data resides and has been processed in the main memory and develop a CPU based algorithm in order to optimize the flight and air fare search in air travel planning, basically using hashing technique. This algorithm also has the potential to take the advantage of multicore processors in the future since it used in-memory data management. With the use of Google hash maps the memory has been used effectively. With the selected sample data almost all the searches could be performed in milliseconds. Also with the increase of the maximum number of connecting airports , searching time is also increased.
- item: Conference-Full-textOptimization methodologies for building performance modelling and optimization(The Engineering Research Unit, University of Moratuwa, 2013-02) Bandara, RMPS; AttaIage, RA; Rodrigo, Rdioxide emfssions. At presen'high emphasis is given on the reduction of energy consumption and carbon footprint by optimizing the performance and resource utilization of buildings to ach,eve sus,a,noble development. Building performance is analyzed in terms of energy performance, indoor environment for human comfort & health, environmental degradation and economic aspects. As for the energy performance analysis, this can be best modeled and optimized by a whole building energy simulation tool coupled with an appropriate optimization algorithm. Building performance optimization problems are inherenty multivariate and multi-criteria. Optimization methodologies with different characteristics that are broadly classified as Adaptive, Non-adaptive and Pareto Algorithms can be applied in this regard. The paper discusses the applicability of the aforementioned optimization methodologies in building performance optimization for achieving realistic results.
- item: Conference-Full-textEffect of cryogenic cooling on machining performance on hard to cut metals - a literature review(The Engineering Research Unit, University of Moratuwa, 2013-02) Senevirathne, SWMAI; Fernando, MARV; Rodrigo, RThis paper presents a literature review done on Cryogenic cooling, Liquid Nitrogen Coot,ng(LNC) and •Chilled Air and Minimum Quantity Lubrication (CAMQL) cooling methods used ,n targeting to recognise belter cooling methods for the Sri Lankan d,e and mould making sector (SLDMMS). The state of the art in cryogenic machining was searched and reviewed first, and then its benefits, limitations and applications were studied. Alternative cooling methods for conventional emulsion cooling were seai ched. The benefits from cryogenic cooling and other alternative methods were analysed and compared. LNC and CAMQL cooling were chosen as subjects for further comparative study. A substantial amount of literature was found on the effect of these cooling methods on hard-to-cut materials such as Inconel, Titanium alloys etc., but very few or no studies had been carried out on materials used in the Sri Lankan die and mould making sector A survey on materials used in SLDMMS is recommended to identify the most commonly used material types. An economic feasibility study of cryogenic cooling and chilled air cooling is recommended.
- item: Conference-Full-textIntelligent lighting controller for domestic and office environments(The Engineering Research Unit, University of Moratuwa, 2013-02) Wijesuriya, WASI; Perera, AHP; Gayan, JMU; AttaIage, RA; Dassanayake, P; Rodrigo, Rne use of natural light instead of artificial light to conduct activities has been shown to havepositive physical and psychological effects in humans. Thus the growing trend of incorporating natural light in office spaces and 'households has created a need for control between the sources of natural and artificial Ugh,. Providing autonomous adequate natural light when it is present and compensating when the light level does not meet the required level, is the primarv task of such controllers. Furthermore, saving energy by operating intelligently according to user presence and demand is the other aspect such conh oilers strive to achieve. The aim of the project is to develop a system which addresses aspects of conti oiling both natural and artificial light inside a room efficiently and at the same time being cost effective in installation. The project aims to develop a system which is adapted to conditions found in Sri Lanka and to research on the preference of light levels in defined groups of people (consisting of Sri Lankans). After which a mathematical model is developed to achieve the aforementioned criteria of balancing light sources to a user.
- item: Conference-Full-textDesign and Optimization of a MEMS Based Piezoresistive Pressure Sensor for Hash Flood Level Measurement.(The Engineering Research Unit, University of Moratuwa, 2013-02) Priyadarshana, TGP; Wijethunge, HMDP; Jayasekara, BCCP; Amarasinghe, YWR; Rodrigo, RThis paper is focused on designing and optimization of a Micro Electro Mechanical System (MEMS) based piezoresistive .t ype pressure 10 enhance the sensitivity by optimally utilizing the maximum available Silicon wafer cell volume of 3mmX3mmX400pm and a fixed thickness of 10pm due to fabrication constrains. Here an analysis is carried out by varying the dimensions of two different diaphragm geometries, namely conventional square type diaphragm and cross-sectional beam type diaphragm. The analysis is done using finite element method (FEM) technique in ANSYS software and by comparing the results, the better diaphr agm type is chosen for the required pressure range oj the application for flash fiood level The results show that for some pressure ranges the cross-sectional beam type diaphragm delivers a much better sensitivity than the conventional square type diaphragm.
- item: Conference-Full-textControl system for quadrotor uav(The Engineering Research Unit, University of Moratuwa, 2013-02) Sampath, BG; Wijesiri, NRAAR; Pitahawatte, JMLMGB; Dassanayake, VPC; Rodrigo, RThis paper presents the design, analysis and testing of a control system for a quadrotor. The research is done together with the were focused on the maneuverability of the quadrotor hence the mechanical design design of the controlling algorithm. Constraints which occur due to using pre-built quadrotors. eliminated by using this methodology. This enables more aggressive and aerobatic fly mg compared to other systems designed with off-the-shelf quadrotors.
- item: Conference-Full-textDocument analysis based automatic concept map generation for enterprises(The Engineering Research Unit, University of Moratuwa, 2013-02) Herath, HMTC; Fernando, KNJ; Karannagoda, EL; Karunarathne, WMID; De Silva, NHN; Perera, AS; Rodrigo, REver growing knowledge bases of enterprises present the demanding challenge of proper organization of information that would enable fast retrieval of related and intended information. Document repositories of enterprises consist of large collections of documents of varying size, format and writing styles. This diversified and unstructured nature of documents restrict the possibilities of developing uniform techniques for extracting important concepts and relationships for summarization, structured representation and fast retrieval. The documented textual content is used as the input for the construction of this concept map. Here a rule based approach is used to extract concepts and relationships among them. Sentence level breakdown enables these ndes to identify’ those concepts and relationships. These rules are based on elements in a phase structure tree of a sentence. For improving accuracy and the relevance of the extracted concepts and relationships, the special features such as titles, bold and upper case texts are used. This paper discusses how to overcome these challenges by utilizing high level natural language processing techniques, document preprocessing techniques and developing easily understandable and extractable compact representation of concept maps. Each document in the repository is converted to a concept map representation to capture concepts and relationships among concepts described in the said document. This organization would represent a summary> of the document. These individual concept maps are utilized to generate concept maps that represent sections of the repository> or the entire document repository’. This paper discusses how the statistical techniques used to calculate certain metrics which facilitate certain requirements of the solution. Principle component analysis is used in ranking the documents by importance. The concept map is visualized using force directed type graphs which represent concepts by nodes and relationships by edges.
- item: Conference-Full-textGeneric log file data extraction(The Engineering Research Unit, University of Moratuwa, 2013-02) Bandara, TPSH; Chandrasekara, WKMSP; Chathuranga, JAR; Chiranjeewa, KAL; Rodrigo, RAutomated software log file analysis holds an important position in software maintenance. Currently available analysis tools are not generic. They tend to focus on specific software or servers and their flexibilities are minimal. Furthermore, costs of commercially available log analysis tools are not affordable for small and medium scale firms. This has left a void in the market for generic, customizable and open source log file analysis tools. The impediment to such a tool emerging is the unavailability of a generic log fie data extraction mechanism. A generic log fie format definition language and an underlying persistent data storage system is a solution to this problem. Log file structures could be defined by the aforementioned language and the data extracted would be stored in the persistent storage. This methodology enables generic log file analysis on top of the extracted data. Through the research and implementations carried out, it was identified that a modified version of simple declarative language is suitable for the log file format definition language. It would have the capability of handling and defining all patterns oj text based log files. Additionally, the results revealed that the appropriate storage mechanism would be an Extensible Markup Language (XML) database mainly because of the similarities between the hierarchical nature of XML and common log file structures.
- item: Conference-Full-textRepresentation of web based graphies and equations for the visually impaired(The Engineering Research Unit, University of Moratuwa, 2013-02) Gunawardhana, CLR; Hasanthika, HMM; Piyasena, TGD; Pathirana, SPDP; Fernando, S; Perera, AS; Kohomban, U; Rodrigo, RWith the extensive growth of technology’, it is becoming prominent in making learning more interactive and effective Due to the use of Internet based resources in the learning process, the visually impaired communin’faces difficulties In this research we are focusing on developing an e-Learning solution that can be accessible by both normal and visually impaired users. Accessibility to tactile graphics is an important requirement for visually impaired people. Recurrent expenditure of the printers which support graphic printing such as thermal embossers is beyond the budget for most developing countries which cannot afford such a cost for printing images. Currently most of the books printed using normal text Braille printers ignore images in documents and convert only the textual part. Printing images and equations using normal text Braille printers is a main research area in the project. Mathematical content in a forum and simple images such as maps in a course page need to be made affordable using the normal text Braille printer, as these functionalities are not available in current Braille converters. The authors came up with an effective solution for the above problems and the solution is presented in this paper.
- item: Conference-Full-textBuilding sand castles within iaas - based cloud instances(The Engineering Research Unit, University of Moratuwa, 2013-02) Sharma, K; Carnage, C; Rodrigo, REnterprises continually seek innovative approaches to reduce operational computing costs while extracting the maximum utility from their resources. Cloud Computing technology play a major role in helping organizations to reduce the operational cost and it is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud consumers are allowed to upload and execute their code inside Cloud Instances(CI) to perform different tasks. At the same time they need to run applications which they cannot trust completely. A compelling approach is needed to mitigate the security risk of executing untrusted applications that could potentially corrupt the resources available for CIs. This paper proposes a confined execution environment, which provides security and protection for CIs running untrusted applications. Cloud consumers can enable the proposed confined execution environment as and when required.
- item: Conference-Full-textRfid assisted smart conveyor system with industrial robot hand(The Engineering Research Unit, University of Moratuwa, 2013-02) Herath, HMDB; Piyasena, RSV; Prasanna, PPGC; Amarasinghe, YWR; Rodrigo, RIn this paper a prototype smart conveyor system is developed with the integration of Radio Frequency Identification (RFID) technology and a robot hand for product handling in a manufacturing environment. A novel Flexible Manufacturing System (FMS) with customer based production is introduced using web-services technology> and a real-time updatable inventory database to enhance operational efficiency’ of the manufacturing environment. The FMS designed is a fully automated system with RFID tags/detectors, intelligent control systems, robot arms and sorting mechanisms, smart conveyor system and a real time updatable inventory database with application software. This study demonstrates the significance and benefits oj a smart conveyor system with the integration of RFID technology for product identification and handling, specifically in the manufacturing industry.
- item: Conference-Full-textA socio - cultural analysis of building and improving safety culture: a case of the marine industry in Sri Lanka(The Engineering Research Unit, University of Moratuwa, 2013-02) Hettiarachchie, PM; Rodrigo, RThe aim of this study is to determine the influential power of some cultural and social factors which could uplift the safety' culture in the Sri Lankan marine industry and to examine the underlying factors which contributed to evolve safety in the marine sector. Such a study is timely as far as current trends developing in this industry are concerned. The researcher used a questionnaire to collect data from 101 employees attached to three key’ organizations of the Sri Lankan marine industry'. The quantitative data collected from the questionnaire were analyzed in order to identify» the trends and their significance. The questionnaire consists of Jive key parameters which were widely used by previous researchers for their safety culture related studies. The analysis of the response to the above factors confirms that the marine industry in Sri Lanka had been able to establish a positive safety culture although there are some areas which need close attention and improvement. Top management commitment to safety> is one key area which achieved a higher level of satisfaction while areas like risk communication, employee empowerment, risk perception of employees are some of the areas which are not at par with the required level. It is also noted that trade union support to make the working environment safe is relatively poor and employees ’ risk acceptance level is high. It is also noted that the peerpressure against unsafe acts and legal framework against Industrial safety’ also are not in a satisfactory level.
- item: Conference-Full-textCorrosion behavior of steel in different atmospheric conditions(The Engineering Research Unit, University of Moratuwa, 2013-02) Adikari, AAMT; Munasinghe, RGN De S; Jayatiieke, S; Rodrigo, RCorrosion of metals makes a large impact on the remedial actions to prevent structures, corrosion the corrosion that economy of a country. Therefore, it is important machinery and vehicles from corrosion. Among the various types of occurs in the atmosphere is known as atmospheric corrosion and it accounts for more failures than other types oj corrosion. To take preventive actions against atmospheric corrosion of metals, it is essential to study the corrosivity of the atmosphere by analyzing factors that influence it. The corrosivity of the atmosphere mostly depends on several atmospheric variables, such as relative humidity, temperature, rainfall, chloride deposition rate, pollutant gases like nitrogen and sulfur oxides. In order to study the severity of the atmosphere which promotes the used structural materials mild steel, stainless steel 304 and 316 conditions. Two corrosion test panels to take metal corrosion three types of commonly were exposed in two different atmospheric placed in two geographical locations and loss of weight due to corrosion was continuously measured in all three types of metals. The atmospheric variables in the two locations were also continuously recorded. Finally, these data were fitted with the power model in order to predict the rate of corrosion under particular atmospheric conditions. With the predicted corrosion rate under a particular atmospheric condition it is possible to take necessary> preventive measures during the design or in the service of metallic structures, machinery and vehicles etc. The broad aim of this research work is to collect adequate data to develop a corrosion model to predict the corrosion rate in any atmospheric environment in Sri Lanka using measured atmospheric variables and thereby establish a 'corrosion map'for Sri Lanka.
- item: Conference-Full-textCharacterization of clay deposits in Nachchcaduwa area ceramic(The Engineering Research Unit, University of Moratuwa, 2013-02) Wanasinghe, DD; Adikary, SU; Rodrigo, RIn this research clay deposits located in the Nachchaduwa area were investigated to identify suitable ceramic fabrication techniques and products. Deposits located in this area are known to be rich in Kaolinite and Montmorillonite (MMT) and other type of phyrophyllitc clays. These are known as "Red Clay and mined to fabricate traditional ceramic ware by traditional techniques. The specimens were collected from tanks located in this area and subjected to Fourier Transform Infrared Spectroscopy (FTIR), X-ray Diffraction (XRD), Differential Thermal Analysis (DTA) and Thermo Gravimetric Analysis (TGA), after purifying them and removing organic compounds. Combination of these techniques with the chemical analysis on selected specimens was employed to accurate identification of the clay specimens. The results were then compared with each other and published literature for the identification. Results showed the presence of MMT, kaolinite, quartz and other type of clay minerals in small quantities; furthermore specimens subjected to chemical analysis revealed that they contain more than 50% quartz by weight. The purified clay specimens subjected to a Dejlocculant Demand Test, which determines the optimum amount of defocculant needed to prepare a casting slip, but the test showed that these claysare not suitable to prepare a casting slip in fabricating ceramic ware.
- item: Conference-Extended-AbstractImproving geospatial data discovery by enhancing public metadata catalog search service(The Engineering Research Unit, University of Moratuwa, 2013-02) Careem, M; Karunarathne, D; Rodrigo, RMost public geospatial data is served via standard compliant Web Mapping Servers and Web Feature Servers available globally. However, it is quite complicated to search and locate the relevant data if the exact data source name and other parameters are unknown. Catalog servers, which store metadata and provide search protocols provide a standard way to handle this problem, but only a few Catalog servers exist which limits the usefulness of such servers for adhoc geospatial data discovery. This paper looks at the advantages of making available metadata of geospatial data through Catalog Servers for adhoc geospatial data discovery. It looks at the limitations oj searching geospatial data using Web Mapping Servers and Web Feature servers and search engines such as Google, and presents a case for having increased Catalog Servers. It then looks at a novel way of building metadata from existing Web Mapping Servers using common data base techniques, which could then lead to more metadata in Catalog Servers, which would in turn lead the way to better and more efficient Geospatial Data Discovery. It then looks at a specialized client that is used to search catalog servers over the web, providing domain experts with a powerful tool to accurately search for data.