KICACT 2017

Permanent URI for this collectionhttp://repository.kln.ac.lk/handle/123456789/17369

Browse

Search Results

Now showing 1 - 10 of 43
  • Item
    V-Synch: Rendering Distance a No-issue with the New Feature of Video Synchronization in Existing Multimedia Platforms.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Tiwari, R.; Shakya, S.
    Social media are computer mediated technologies that allow creating and sharing of information idea, career interests and other forms of expression via communities and networks. They introduce substantial and pervasive changes to communication between businesses, organizations, communities and individuals. Various features are being introduced in this field with the objective to make it more attractive to users. “V-Synch” is aimed at introducing features like video and sketch pad synchronization to develop a full- fledged app that also has the current popular features like internet call and chat. We intend to make an android application in which users can always stay connected through multiple platform synchronization (watch the video and use sketch pad in synchronized way in real time) although they are distance apart. All the devices connected to the group can take control of video playback. When any user of that group starts, pauses, or performs specific action on a video, the state of that video is synchronized to all other connected devices in real time. The elements drawn on sketch pad are also shown live in real time to everyone connected to the group. NTP algorithm is used to synchronize all participating devices to within a few milliseconds of Coordinated Universal Time (UTC). The synchronization is correct when both the incoming and outgoing routes between the client and the server have symmetrical nominal delay. V-Synch could be very much beneficial to students for group study, long distance friends to hang out together and Serve a great deal in case of tele-education.
  • Item
    Virtual Learning – A Popular Learning Method Among Students.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Abeysinghe, A.
    A virtual learning environment (VLE) or e-learning is a popular method of learning at present. But VLE depends on student acceptance of such kind of programs; if they prefer e-learning or classroom learning. Though VLE could save time, cost, space and motivate students to learn in a new dilemma, VLE poses several drawbacks in addition to those experienced by traditional methods of learning. These include difficulties in adapting to this system of learning, lack of computer literacy, lack of student motivation as well as technical issues. This trend is prominent, especially in developing countries where students are still in the process of adapting to a web and mobile app-based culture of learning. Also, students in developing countries often face problems of low speed Internet as well as lack of Internet access. Therefore, this research focuses on how switching from a traditional culture to an Internet-based culture could be achieved and how distance learning could be promoted in the distant world thus minimizing the digital divide. This research focused on solving these issues under four main themes: providing foundation on how websites and mobile apps could be used, providing streaming and caching facilities for slow Internet connections, creating surveys among students from different demographic, ethnic and geographic backgrounds and designing courses appropriately and ensuring multilingual course availability. According to the research, it was found that these solutions could be achieved in the near future with the advancement of the Internet and new technologies in developing countries. As such, it was inferred that virtual learning could be promoted as a learning method among students in developing countries.
  • Item
    The Impact of a Security Culture in Small and Medium Scale Enterprise (SME) on Enterprise Information Security
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Pathirana, H.P.A.I.; Karunathilaka, J.A.M.A.
    An information system is much more than computer hardware; it is the entire set of software, hardware, data, people, procedures, and networks that make possible the use of information resources in the enterprise. In current world, the information is stored in the computerised system in the form of digital data, including sensitive data, which can be extracted as needed. It is much better than maintaining hard copies in traditional manner by using physical storages. The information system security is crucially important for a business with that background. The SME introduces in many forms. Many use the number of employees, capital amount invested, turnover amount, and nature of business. In Sri Lanka, main banks use value of fixed assets as a way to introduce SME, whereas the World Bank uses number of employees as the criteria. Even though enterprises are relatively small and run with a limited budget, SMEs can now target national and international market segments, enabled by the Internet. Therefore, this complicated the business process at SMEs. The computer security represents confidentiality, integrity and availability (CIA) from the mainframe-computing era. The rise of the Internet and complex computer systems means that data is now decentralized. As such, the security measures now must extend form the CIA domain to cover additional areas, depicted in the McCumber Cube in three dimensions. This challenges SME’s to assure information security with a limited operating budget, and there are two approaches presented by the ‘Sphere of Protection’, focusing on both technology and people aspects. The technological aspect is expensive, whereas the people aspect is cost effective by introducing security culture. The policy implementation is the better tool for security culture by considering business in process level emphasizing laws to acknowledge people on the importance of assuring secure environment, and education and training are important to share the knowledge among employee. This paper explores the need for effective people based security measures for better security culture, before the implementation of technological controls is considered for SMEs.
  • Item
    Stock Market Analysis and Prediction.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Shakya, A.; Pokhrel, A.; Bhattarai, A.; Sitikhu, P.; Shakya, S.
    Stock price and stock index price forecasting system, used by investors and financial managers to describe the market and compare the return on specific investments, has been a topic of research for very long now. When in the stock market, there are more buyers than there are sellers, the price must adapt or no trades are made. This tends to drive the price upwards, increasing the market quotation at which investors can sell their shares, enticing investors who had previously not been interested in selling and vice versa. These demands and supplies are ever changing, resulting in highly-fluctuating, non-linear stock prices which poses a threat against the credibility of those prediction systems which only view the market from one perspective. For a reliable system, it is therefore important to explore the market on multiple grounds, basically through Technical, Fundamental and News Analysis. Under Technical Analysis, SMA (Simple Moving Average) is used as a preliminary data smoothing technique, which helps reduce the fluctuations substantially. Artificial Neural Networks (ANNs) is then employed to analyze the nonlinear relationships between the stock closed price and various technical indexes, and to capture the knowledge of trading signals that are hidden in historical data. Features like traded share, traded volume, opening price, closing price, high price and low price are fed as an input parameter in Neural Network. Backpropagation algorithm is then implemented to train the given Network model. The neural network layers and neuron numbers in hidden layers are then tuned by training and validating the data set iteratively. The fundamental analysis involves thorough study of financial statements of companies, also known as quantitative analysis. This involves looking at assets, liabilities, revenue, expenses and all other financial aspects of a company. It gives insight on the company's future performance. The results moreover reflect the company's success or failure over the long term than immediate future. Hence, unlike technical analysis, it helps predicting stock price on a long run. In news analysis, we focus on understanding the news sentiment and its affects which may cause the investors to either buy or sell the shares based on positivity or negativity of the news. The news analysis problem can be mapped into similarity based classification. A set of vectors are created from analysis of historical news, where each component of a vector represents the features in data set. The required labeling are done based on historical rise/fall of stock prices. The increase or decrease of the trend is then predicted based on similarity measures. In short, news analysis predicts the price of share of the following day by comparing the most recent news with past news using Knearest neighbor algorithm. Thus, through the circumstantial application of the above-mentioned analysis, the paper proposes to predict the stock market in a more generalized manner.
  • Item
    Smart Home Automation Voice Controller.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Perera, P.V.S.P.; Weerasinghe, K.G.H.D.
    Each day we are aiming for a smart living condition and make our lives more convenient and fast. The traditional wired electrical device controlling switch is an old concept now. “Voice operated device controlling” utilizes human voice commands to control electrical appliances. This research aims to design and implement a cost effective, portable, user-friendly, secure and simpler Home automation voice controller that can be operated by using Android smart phone. It also reduces the energy usage in the residential sector. This system is also designed to assist and provide support in order to fulfill the needs of elderly and disabled in the home. This research describes the way of remote controlling and monitoring electrical household appliances using Android Smart Phone Bluetooth features and wireless Bluetooth technology module depending user voice commands. The proposed system has two main components, namely voice recognition system and clicking mode facility. When automating a home load not available in the visible range, fault identification system in this design helps the user to ensure that their home appliances had gone exactly ON or OFF. The app was designed by allowing the user to add or edit the appliances. The user had the freedom to add appliances names to this app. User can select either voice mode or clicking mode. Even he/she can check the current status. Changing the language is also available in this app. As an example device name is Fan. The user has to say “Fan” to switch ON. If user wants to switch off, again, has to say “Fan”. Google voice recognition with its voice recognition and voice command features has been used to determine the voice of the user. From the commands received from an android device, the electrical appliances’ current status can be controlled. Android Phone will convert voice into a string of data using Google voice recognition feature. This string of data will be sent to Bluetooth module and then to Arduino UNO. After that, Arduino decodes and process it. The Figure 1 expresses the system architecture of the entire system. Arduino UNO is very popular, cheap product and very easy to use. Bluetooth module, relays are interfaced to the Microcontroller. The data received by the Bluetooth module from an Android smart phone is fed as input to the controller. The controller acts accordingly on the relays of the electrical appliances. The electrical appliances in the research can be made to switch on or off using the Android phone. The application shows the status of switch whether on or off. In achieving the task, the controller is loaded with a program written using Arduino language. This system facilitates features such as automation, multi-functionality, adaptability, interactivity and efficiency for home appliances controlling. As future enhancements, hope to design input voice commands in different language and hope to design smart watch with hand gestures to control in a more user friendly.
  • Item
    Recognising Elders using Behavioural Biometrics
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Preethiraj, R.; Sarveswaran, K.
    The elderly population continues to grow everywhere and it finds difficulties to access websites due to various reasons including functional impairments like lack in vision, hearing, mobility and movement. Therefore, websites are usually made separately for elders to improve their user experience. However, first it’s important to recognise whether a user is an elder or not, and for that usually user profile information such as date of birth or age are used. Users may reluctant to feed information or may even feed a wrong one. This research proposes a method using which elders can automatically be recognised using behavioural biometrics of them. Based on the initial observational study on elders it was noted that elders shake the mouse to identify the mouse pointer location, do scrolling fast without much control, and the elders take a lot of time to click on a link or button after moving over it. These three observation were considered as behavioural biometrics to recognise elders. A data set was compiled in a control environment from 24 people of different ages including 18 elders who are more than age of 65. All the people were asked to follow a same set of tasks in two websites. Thereafter, the collected data were cleaned and a decision tree was built to recognise elders using j48 algorithm and Weka tool. The results showed that elders move the mouse faster than 5.7928 pixel/millisecond, scroll faster than 3.455561/millisecond, and take more than 1, 158.6875 milliseconds to respond over a link or button. Thereafter more behavioural biometrics were collected from random users in open environment in which users were asked to fill a questionnaire with the intention of collecting their age. The collected data then were used to validate the decision tree. It was found that speed of mouse movement recognises the elders with 84.51% accuracy, scrolling speed recognises with 96.08% accuracy, and response time recognises elders with accuracy of 97.68%. The results show that instead of rely on user profiles, elders can be recognised using user behavioural biometrics with significant accuracy. Though the response time shows a high recognition rate, it is planned to explore the combination of different behaviour biometrics together to see whether recognition rate can be improved.
  • Item
    Online Train Ticket Reservation System.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Siriweera, U.G.S.M.; Dias, N.G.J.
    Railway is one of the most important means of transportation, and plays a vital role in the transport industry. With such a huge customer base, purchasing train tickets has been a very prominent problem. Railway E-Ticketing systems have been developed with the acceleration of technology but, they are not economically viable as mobile applications. After considering the above facts, “Sri Lankan Railway (SLR)” has been developed as a mobile application for making online reservations and accessing relevant information across different locations via are Internet. In SLR Application, user should create an account as first time and then can make a reservation by adding the train details. As soon as the payment is done, reference number is generated on the application. While this is convenient for most people, it has made things particularly easier for people residing in remote areas. It is much easier than standing in long queues. So they can book tickets with a tap and they can check available train for required date and time, which seats are already booked in relevant compartment and which are the seats available for booking. They can graphically see those details. The system has a separate application called checker application (SLRCS) for validation of ticket. Since Checking application it saves a huge work of the ticket checkers for validation of tickets by moving from manual ticket checking process to digital ticket checking process. This is done by just scanning with their own android mobile to validate the ticket. Using this application, Railway department’s employees can log on to checkers account and the system verifies the ticket reservation by comparing generated reference number. Further the android and cloud based technologies have been used for the development process of the both applications. The SLR application was a success in developing an online mobile ticket booking which could satisfy the current problems of passengers who reserve tickets. The testing process has been successfully done by reviewing users in different backgrounds. An application for managing server side can be proposed to further enhancement for the project. In order to manage the database as the admin, it can provide a dashboard. In current application, the database updates manually. Need to focus on a way of letting it to be updated automatically. And a payment gateway should have to apply for the implementation stage. The developed SLR application will contribute for a positive impact in the business economy in Sri Lanka. Hopefully, it will be beneficial for all the users who travel in trains and it will make their lives easier.
  • Item
    On Compression Ratio Info-leak Mass Exploitation (CRIME) Attack and Countermeasures.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Prasadi, S.; Alupotha, J.; Fawzan, M.; Alawatugoda, J.; Ragel, R.
    Header compression is desirable for network applications, as it saves bandwidth. However, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This leads to the CRIME attack on web traffic protected by the SSL/TLS protocols. In order to mitigate the CRIME attack, compression is completely disabled in the TLS/SSL-layer. Although disabling compression completely mitigates the CRIME attack, it has a drastic impact on bandwidth usage. The attack is carried out with the assumption that the attacker has the ability to view the victim’s encrypted traffic. An attacker can accomplish this with a network protocol analyzer. It is also assumed that the attacker has the ability to make the victim client to send requests to the targeted web server. This can be accomplished by coercing the victim to visit an attacker-controlled site (which contains a JavaScript code that sends requests to the targeted server with attacker-injected values in request headers). The attacker will coerce the victim to send a small number of requests to guess the first byte of the secret cookie. The attacker then measures the size of the (compressed) request headers. With that information, the CRIME attack algorithm determines the correct value for the first character of the secret cookie. Since the attack relies on LZ77 loss-less data compression algorithm, the first byte of the target secret must be correctly guessed before the second byte is attempted. Separating secret cookies from compression is presented as a proven-secure countermeasure against CRIME attack in a previous work: (1)--separates all the secret cookies from the request header. (2)--rest of the header is compressed, while the secrets are kept uncompressed. Since the secret cookie is not compressed with the attacker-injected values, the origin of the compression leakage is shut. Thus, the proposed solution completely prevents the CRIME attack and also enables header compression. This is useful in reduction of network bandwidth usage. Figure 1 CRIME attack setup In this work we create a test environment to replicate the CRIME attack and to test countermeasures.
  • Item
    Monitoring of Land Use Changes Using Remote Sensing and GIS, A Case Study in Kandy Divisional Secretariat.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Withanage, W.K.N.C.
    Multi-temporal satellite imageries help in understanding land use dynamics. The study illustrates the spatial-temporal dynamics of land use and land cover of Kandy Divisional Secretariat Division (DSD). Understanding and quantifying the spatial temporal dynamics of urban land use and land cover changes and its driving factors is essential to put forward the right policies and monitoring mechanisms on urban growth for decision making. Main objective of the study was to analyze land use and land cover changes in Kandy DSD by integrating remote sensing and GIS techniques for the period of 2000 - 2015. In order to achieve this, Landsat satellite imageries of three different time periods were acquired and quantify the changes in the Kandy DSD from 2000 to 2015.The images of the study area were categorized into four different classes namely water bodies, dense forests, built up areas and other. The Maximum Likelihood Algorithm of Supervised Classification has been used to generate land use and land cover maps. For the accuracy of classified land use and land cover maps, an error matrix was used to derive overall accuracy. The results of this study have shown that from 2000 to 2015, the rate of dense forest area has massively declined by 14.44km2 (24.54%) and the built-up area has increased by 9.28 km2 (15.81 %). In addition to that, water area has increased by 0.14 km2 (0.25%) during this period. Category of other has increased by 4.96 km2 (8.48%) which includes mixed forest lands, scrubs, home gardens, other crop fields etc. The overall accuracy performed in this study was identified as 88%, 87% and 90% for year 2000, 2007 and 2015 respectively. These changes were mainly attributed by the increase of population associated with high demand for urban development as well as unplanned urban expansion. GIS based land use models have high potential as a tool in land use and land cover change studies. But using high resolution imageries such as IKONOS and Quick Bird are essential in generating good quality land cover maps. For optimum utilization of rare land resource, national policy should be enacted which is directed towards sustainable development not only in Kandy DSD but also in the country.
  • Item
    Machine Learning Dashboard for Aviation Fuel Optimization.
    (Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Samarasinghe, R.M.N.S.; Dias, N.G.J.
    The aviation industry is the one of the fastest-growing travel industry in the world. This industry is growing 7% per year and is giving its facilities for more than 1.5 billion passengers. The International Air Transport Association (IATA) indicates that this number will pass in the next 20 years by 7.3 billion of passengers. Due to this large growing passenger count, airplane manufacturing companies such as Boeing & Airbus are making more efficient planes to handle this amount. Aviation fuel is the biggest cost in air transport. IATA (The International Air Transport Association) figures show that everyone dollar increase in the cost of oil per barrel increases the airline industry's costs by about $1 billion. So that airline companies do their best to optimize the fuel usage managing many types of maintenance, weight flowing management to reduce the plane taxi fuel. Airplane manufacturing companies are also gearing up to make more fuel-efficient planes. This research project built finding suitable variables and providing a solution to overcome the high fuel usage by using a neural network model to predict the fuel usage, CO2 emission dashboard to get necessary steps to reduce CO2. Finding the suitable variables are the most challenging part in this research. To find them, correlation coefficient method was used. Before using this method need to normalize the dataset using the statistical normalization method after that used this method to find the linear combinations of the fuel usage & other dependent variables. If the value is next to -1 then it gives a perfect negative relation or if +1 then it is a perfect positive relation. For this analysis, the best fit regression model was created based on the variables Actual passenger count, Flight wing size, Flight length, Flight height, Distance between airports, zero fueling weight identified are those variables. For a prediction model, it is more practical to use simple model than a complex model. Before developing this model, data need to be clean (without empty data sets) and eliminate the outlier data from the data set after the normalization process which was done by using the statistical quartile method. For this model 2 types of training, functions were used to create the models ‘Bayesian regularization back-propagation’ and ‘scaled conjugate gradient back-propagation’. ‘Bayesian regularization’ method is the best training to train noisy data sets. After training these 5 layers (4-hidden layer) 5-10-5-10 hidden neuron model, then it was selected as the minimal error rate. There were 26, 834 data points & 70% were used to train this model and the rest 30% was used for testing. For this research, there are lots of future works could be done adding weather data, giving a recommendation in flight scheduling process.