Access control is so vital in eHealth, because compromised sensitive medical data often leads to ... more Access control is so vital in eHealth, because compromised sensitive medical data often leads to severe consequences for both patients and health workers, resulting in financial losses or even patient death. In this paper, we propose a technique to implement a dynamic and flexible access control mechanism to ensure present access rights of sensitive medical data in a collaborative medical discussion in a mobile environment. Initially, a symmetric and public key encryption using elliptic curve cryptography is used to encrypt a user session. At this stage, the elliptic curve is defined in a prime finite field with the characteristic of p where p is a prime and p > 3. Curve parameters a and b are carefully chosen to avoid vulnerable curves. Subsequently, unique public and private key pairs are generated for all the users in the session. Results show the importance of having optimal elliptic curve implementations for mobile usage.
Computer programming captivates the attention of both professionals and young learners due to its... more Computer programming captivates the attention of both professionals and young learners due to its multidisciplinary applications and high paid jobs. However, mastering computer programming requires critical thinking and consistent practice under the guidance of expert teachers. Consistently assessing the programming laboratories and giving detailed feedback are curial for novice learners. However, manual grading is daunting and timeconsuming. Moreover, novice programmers often do not identify all the test cases and sufficient test data to test their programs thoroughly. This research introduces a sophisticated web-based system to aid instructors in grading programming assignments. Instructors can create questions and corresponding solutions, shared with students, who then write their programs. The system generates test cases for both student and correct solutions, assessing performance through comparison. A survey with 30 teachers affirmed the system's effectiveness, rating it 4.00 for simplifying assessment and 4.13 for user-friendliness on a 5point Likert scale. Statistical analysis, yielding a p-value of 0.034, supported its positive impact. This web-based grading system not only streamlines assessment but also enhances the educational experience, fostering a user-friendly environment for both instructors and students.
It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cy... more It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cycle. In this paper, we prove that the Cayley graph of with respect to a generating set , , where with and is Hamiltonian for. Furthermore, the existence of a Hamilton cycle in the Cayley graph of a semidirect product of finite groups is proved by placing restrictions on the generating sets. Consequently, the existence of a Hamilton cycle in the Cayley graphs of several isomorphism types of groups of orders and , where is also proved.
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022
Public-key cryptosystems using non-abelian groups had been a research inspiration especially sinc... more Public-key cryptosystems using non-abelian groups had been a research inspiration especially since the proposal of Shor's quantum algorithm attack in 1994. In this article, we prove two approaches to novel encryption schemes using elements of some non-abelian groups based on an intractable problem of determining automorphisms and generating elements of a group. We show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. Moreover, achievement of resistance to algebraic span cryptanalysis by integrating a technique introduced in the existing literature is discussed.
European Modern Studies Journal (ISSN 2522-9400), 2020
It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cy... more It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cycle. In this paper, we prove that the Cayley graph of with respect to a generating set , , where with and is Hamiltonian for. Furthermore, the existence of a Hamilton cycle in the Cayley graph of a semidirect product of finite groups is proved by placing restrictions on the generating sets. Consequently, the existence of a Hamilton cycle in the Cayley graphs of several isomorphism types of groups of orders and , where is also proved.
International Journal of Computer Science & Network Security, 2021
Non-abelian group based cryptosystems are a latest research inspiration, since they offer better ... more Non-abelian group based cryptosystems are a latest research inspiration, since they offer better security due to their non-abelian properties. In this paper, we propose a novel approach to nonabelian group based public-key cryptographic protocols using semidirect products of finite groups. An intractable problem of determining automorphisms and generating elements of a group is introduced as the underlying mathematical problem for the suggested protocols. Then, we show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. The applicability of Hamiltonian paths, and in fact any random path in Cayley graphs in the above cryptographic schemes and an application of the same concept to two previous cryptographic protocols based on a Generalized Discrete Logarithm Problem is discussed. Moreover, an alternative method of improving the security is also presented.
International Journal of Computer Science & Network, 2021
Non-abelian group based Cryptography is a field which has become a latest trend in research due t... more Non-abelian group based Cryptography is a field which has become a latest trend in research due to increasing vulnerabilities associated with the abelian group based cryptosystems which are in use at present and the interesting algebraic properties associated that can be thought to provide higher security. When developing cryptographic primitives based on non-abelian groups, the researchers have tried to extend the similar layouts associated with the traditional underlying mathematical problems and assumptions by almost mimicking their operations which is fascinating even to observe. This survey contributes in highlighting the different analogous extensions of traditional assumptions presented by various authors and a set of open problems. Further, suggestions to apply the Hamiltonian Cycle/Path Problem in a similar direction is presented.
Business projects are one of the major pillars of the economy of any country. People may have exc... more Business projects are one of the major pillars of the economy of any country. People may have excellent business ideas, but they may not have money to start them. Getting a loan may not be an easy task for a novice businessman. On the other hand, there can be many people who are seeking investment opportunities. However, they may not have sufficient funds to invest in business alone. When investing as groups, conflicts in negotiations will rise. Moreover, the issue of trust will increase. This research, we are proposing a new crowdfunding and decision-making platform for major projects in public and private sectors using blockchain technology. A businessman can submit his business plan and invite people to invest in if they like the given agreement. Investors can invest any amount and propositionally attend on decision making of each activity in the project by casting their votes. This platform helps to invest in large business projects over the lack of trust and issues of the existing investment methods. Because the reliability and the security of the system are higher as the agreement and the votes are written in the distributed ledger permanently, and decision-making happens without the involvement of humans.
The importance of remote observation and controlling has been rapidly increased in recent years d... more The importance of remote observation and controlling has been rapidly increased in recent years due to the evolution of mobility. Since mobile phones have become pre dominant at present, quite ubiquitous and increasingly sophisticated, the integration of the mobile phone and a surveillance system becomes more meaningful. This research explored possible ways of implementing such system over existing mobile phone infrastructure without any other third party service providers. However, this reveals the important of integration of mobile phone and embedded system over generic interface such as USB. Additionally, it addresses the design and the implementation of such home security system. It reveals about challenges that occurring while using several technologies simultaneously though they individually work properly. Further it converses about importance, limitations and challenges of synchronizing several functions together such as reading and writing via serial port of a microcontrolle...
Automatic Vehicle number plate recognition (AVNR) is a very popular and highly demanding in trans... more Automatic Vehicle number plate recognition (AVNR) is a very popular and highly demanding in transportation industry, law and enforcement such as automating fines for traffic rule violations, automating parking lots, entry and exit in highways, quickly identifying granted vehicles. Most of the AVNRs use image processing techniques such as image enhancement, restoration, segmentations, block-based character recognition, optical character recognition and template matching. This paper presents the design and implementation of such a system to General Sir John Kotelawala Defence University (KDU) to capture and recode vehicle logs. People face difficulties at the gate premises due to the existing manual system. To collect the data, qualitative research techniques such as interviews and observations were used. Once an image captured, median filters were used to remove noises. Sharpen filters used to detect edges. Camera calibration was used to correct the perspective view. Lines were detec...
2019 International Research Conference on Smart Computing and Systems Engineering (SCSE), 2019
Disorganized city planning and a huge rise in use of automobiles on the road have caused massive ... more Disorganized city planning and a huge rise in use of automobiles on the road have caused massive traffic congestion in cities across the world. Pedestrian crossing designed to facilitate movement across the road network, have unfortunately become a hindrance to movements of traffic. Though the smart zebra lines had been introduced, it has not contributed much to reduce the time that holds vehicle lines under the traffic lights. Moreover, the establishment of transfer hubs and underground crossings remain silent in local context because of their cost. Even though there are plenty of pedestrian crossing mechanisms available, they are not secure and not ideal for the disabled, elderly, children, and the sick. Considerable numbers of police officers have to spend their time on traffic controlling duties though it’s inefficient and wastage of human resources. A number of studies have focused on automated vehicles and robots as tools to ease problems of congestion. This paper, it focuses ...
This paper presents the low cost autonomous logistic trolley for factory automation. Automation c... more This paper presents the low cost autonomous logistic trolley for factory automation. Automation can be defined as the technology by which a process or procedure is performed without human assistance. Factory automation has automated the factory manufacturing process without human interaction. It will increase the efficiency of the manufacturing process, make the process highly accurate and because of less man power it will increase the revenue margin of the factory. The system primarily consists of a Arduino Uno board, ultrasound sensors, infrared proximity sensors, Bluetooth modules, DC motors, and Servo motors. This system mainly includes obstacle detection, line tracking, Bluetooth request transferring technologies and motion control technologies. This trolley is called up by a production desk of the factory if materials are needed, by sending a request. Trolley automatically deliveres the material to that exact production desk using its infrared sensors that are placed at both l...
Diabetes is one of deadliest diseases in the world. As per the existing system in Sri Lanka, pati... more Diabetes is one of deadliest diseases in the world. As per the existing system in Sri Lanka, patients have to visit a diagnostic center, consult their doctor and wait for a day or more to get their result. Moreover, every time they want to get their diagnosis report, they have to waste their money in vain. But with the rise of Machine Learning approaches, we have been able to find a solution to this problem using data mining. Data mining is one of the key areas of Machine learning. It plays a significant role in diabetes research because It has the ability to extract hidden knowledge from a huge amount of diabetes related data. The aim of this research is to develop a system which can predict whether the patient has diabetes or not. Furthermore, predicting the disease early leads to treatment of the patients before it becomes critical. This research has focused on developing a system based on three classification methods namely, Decision Tree, NaĂ¯ve Bayes and Support Vector Machine ...
The word mushroom may mean different things to different people in different countries. Mushrooms... more The word mushroom may mean different things to different people in different countries. Mushrooms can be used as food, tonics, medicines, cosmeceuticals, and as natural biocontrol agents in plant protection with insecticidal, fungicidal, bactericidal, herbicidal, and nematocidal activities. Plant growth is affected by various factors. The most important factors for the quality and productivity of plant growth are temperature, humidity and light. This research presents the design and implementation of a smart system based on the wireless sensor network for monitoring and controlling mushroom growing conditions for farmers. The system contains five main units; namely sensing, transmission, decision making, controlling and monitoring. The system contains two main unit named as transceiver unit and receiver unit. The humidity sensor, temperature sensor and soil moisture sensor measure current environment condition and send the sensed value to the receiver unit using ZigBee. Then the Zig...
Detection of obstacles during navigation of a mobile robot is considered difficult due to varying... more Detection of obstacles during navigation of a mobile robot is considered difficult due to varying nature in terms of size, shape and location of the obstacle as well as ambient light that interferes with infra-red (IR) signals of the robot. In this paper, we propose a novel low-cost method that successfully guides a robot along a path using image processing and IR sensor circuits. A high continuous IR signal is converted into a low continuous IR signal by means of a demodulation circuit that enables a peripheral interface controller to receive this low continuous IR signal and take relevant decisions based on the signal. The images taken from a web camera are preprocessed to remove noise and detect edges. Subsequently, an image processing routine effectively calculates the angle to be rotated of the front wheels using a scan line algorithm. A minimum mean distance error of 2.45 was observed in tracking the path at a signal-to-nose ratio of 26.50. The accuracy of speech recognition w...
The main intent of the research is to develop an automated application that can determine the Not... more The main intent of the research is to develop an automated application that can determine the Nottingham Histologic Score of a given input histopathological image obtained from breast cancer or healthy tissues with DenseNet based architecture. In this study, we were able to obtain more than 94% accuracy rates for each trained model including 2-predict, 3-predict, and 4-predict networks.
Kasun K. Jinasena kasun@sjp.ac.lk Faculty of Applied Science University of Sri Jayewardenepura Ga... more Kasun K. Jinasena kasun@sjp.ac.lk Faculty of Applied Science University of Sri Jayewardenepura Gangodawila, Nugegoda, Sri Lanka Ravinda G.N. Meegama rgn@dscs.sjp.ac.lk Department of Statistics & Computer Science Faculty of Applied Science University of Sri Jayewardenepura Gangodawila, Nugegoda, Sri Lanka
Business projects are one of the major pillars of the economy of any country. People may have exc... more Business projects are one of the major pillars of the economy of any country. People may have excellent business ideas, but they may not have money to start them. Getting a loan may not be an easy task for a novice businessman. On the other hand, there can be many people who are seeking investment opportunities. However, they may not have sufficient funds to invest in business alone. When investing as groups, conflicts in negotiations will rise. Moreover, the issue of trust will increase. This research, we are proposing a new crowdfunding and decision-making platform for major projects in public and private sectors using blockchain technology. A businessman can submit his business plan and invite people to invest in if they like the given agreement. Investors can invest any amount and propositionally attend on decision making of each activity in the project by casting their votes. This platform helps to invest in large business projects over the lack of trust and issues of the existing investment methods. Because the reliability and the security of the system are higher as the agreement and the votes are written in the distributed ledger permanently, and decision-making happens without the involvement of humans.
A large part of society today does not trust decision making in government policies and projects.... more A large part of society today does not trust decision making in government policies and projects. It is time to move into new technology such as decision making on government policies and projects using the latest technology like blockchain and advanced cryptography. Building of blockchain-based secure, reliable, and distributed voting system for decision making in government policies and projects has been a challenge for a long time. Distributed ledger technologies are exciting technology advancement in the information technology world. Blockchain-based technologies offer an infinite range of applications that benefit from sharing economies of scale. The purpose of this research paper is to evaluate the use of blockchain as the implementation of distributed electronic voting systems for decision making on government policies and projects. More generally, this article assesses the potential of distributed ledger technologies in improves security by implementing an election process and blockchain-based application. This technology will be benefited to Grama sewa officers who will give correct vote. Because country like Sri Lanka we have 14020 Grama sewa regions. Each member get a chance to cast his vote. One vote for each project, it can be changed before the due date and only the last one can be counted. The grama sewa officer who cast his vote cannot be tracked, but the officer can cast a unique vote. After a while, the officer may join a fund or a fine. Voting on government policies or projects is mandatory and officer cannot prevent it. This will help to get the best option for government policies or projects.
Access control is so vital in eHealth, because compromised sensitive medical data often leads to ... more Access control is so vital in eHealth, because compromised sensitive medical data often leads to severe consequences for both patients and health workers, resulting in financial losses or even patient death. In this paper, we propose a technique to implement a dynamic and flexible access control mechanism to ensure present access rights of sensitive medical data in a collaborative medical discussion in a mobile environment. Initially, a symmetric and public key encryption using elliptic curve cryptography is used to encrypt a user session. At this stage, the elliptic curve is defined in a prime finite field with the characteristic of p where p is a prime and p > 3. Curve parameters a and b are carefully chosen to avoid vulnerable curves. Subsequently, unique public and private key pairs are generated for all the users in the session. Results show the importance of having optimal elliptic curve implementations for mobile usage.
Computer programming captivates the attention of both professionals and young learners due to its... more Computer programming captivates the attention of both professionals and young learners due to its multidisciplinary applications and high paid jobs. However, mastering computer programming requires critical thinking and consistent practice under the guidance of expert teachers. Consistently assessing the programming laboratories and giving detailed feedback are curial for novice learners. However, manual grading is daunting and timeconsuming. Moreover, novice programmers often do not identify all the test cases and sufficient test data to test their programs thoroughly. This research introduces a sophisticated web-based system to aid instructors in grading programming assignments. Instructors can create questions and corresponding solutions, shared with students, who then write their programs. The system generates test cases for both student and correct solutions, assessing performance through comparison. A survey with 30 teachers affirmed the system's effectiveness, rating it 4.00 for simplifying assessment and 4.13 for user-friendliness on a 5point Likert scale. Statistical analysis, yielding a p-value of 0.034, supported its positive impact. This web-based grading system not only streamlines assessment but also enhances the educational experience, fostering a user-friendly environment for both instructors and students.
It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cy... more It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cycle. In this paper, we prove that the Cayley graph of with respect to a generating set , , where with and is Hamiltonian for. Furthermore, the existence of a Hamilton cycle in the Cayley graph of a semidirect product of finite groups is proved by placing restrictions on the generating sets. Consequently, the existence of a Hamilton cycle in the Cayley graphs of several isomorphism types of groups of orders and , where is also proved.
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022
Public-key cryptosystems using non-abelian groups had been a research inspiration especially sinc... more Public-key cryptosystems using non-abelian groups had been a research inspiration especially since the proposal of Shor's quantum algorithm attack in 1994. In this article, we prove two approaches to novel encryption schemes using elements of some non-abelian groups based on an intractable problem of determining automorphisms and generating elements of a group. We show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. Moreover, achievement of resistance to algebraic span cryptanalysis by integrating a technique introduced in the existing literature is discussed.
European Modern Studies Journal (ISSN 2522-9400), 2020
It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cy... more It has been conjectured that every connected Cayley graph of order greater than has a Hamilton cycle. In this paper, we prove that the Cayley graph of with respect to a generating set , , where with and is Hamiltonian for. Furthermore, the existence of a Hamilton cycle in the Cayley graph of a semidirect product of finite groups is proved by placing restrictions on the generating sets. Consequently, the existence of a Hamilton cycle in the Cayley graphs of several isomorphism types of groups of orders and , where is also proved.
International Journal of Computer Science & Network Security, 2021
Non-abelian group based cryptosystems are a latest research inspiration, since they offer better ... more Non-abelian group based cryptosystems are a latest research inspiration, since they offer better security due to their non-abelian properties. In this paper, we propose a novel approach to nonabelian group based public-key cryptographic protocols using semidirect products of finite groups. An intractable problem of determining automorphisms and generating elements of a group is introduced as the underlying mathematical problem for the suggested protocols. Then, we show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. The applicability of Hamiltonian paths, and in fact any random path in Cayley graphs in the above cryptographic schemes and an application of the same concept to two previous cryptographic protocols based on a Generalized Discrete Logarithm Problem is discussed. Moreover, an alternative method of improving the security is also presented.
International Journal of Computer Science & Network, 2021
Non-abelian group based Cryptography is a field which has become a latest trend in research due t... more Non-abelian group based Cryptography is a field which has become a latest trend in research due to increasing vulnerabilities associated with the abelian group based cryptosystems which are in use at present and the interesting algebraic properties associated that can be thought to provide higher security. When developing cryptographic primitives based on non-abelian groups, the researchers have tried to extend the similar layouts associated with the traditional underlying mathematical problems and assumptions by almost mimicking their operations which is fascinating even to observe. This survey contributes in highlighting the different analogous extensions of traditional assumptions presented by various authors and a set of open problems. Further, suggestions to apply the Hamiltonian Cycle/Path Problem in a similar direction is presented.
Business projects are one of the major pillars of the economy of any country. People may have exc... more Business projects are one of the major pillars of the economy of any country. People may have excellent business ideas, but they may not have money to start them. Getting a loan may not be an easy task for a novice businessman. On the other hand, there can be many people who are seeking investment opportunities. However, they may not have sufficient funds to invest in business alone. When investing as groups, conflicts in negotiations will rise. Moreover, the issue of trust will increase. This research, we are proposing a new crowdfunding and decision-making platform for major projects in public and private sectors using blockchain technology. A businessman can submit his business plan and invite people to invest in if they like the given agreement. Investors can invest any amount and propositionally attend on decision making of each activity in the project by casting their votes. This platform helps to invest in large business projects over the lack of trust and issues of the existing investment methods. Because the reliability and the security of the system are higher as the agreement and the votes are written in the distributed ledger permanently, and decision-making happens without the involvement of humans.
The importance of remote observation and controlling has been rapidly increased in recent years d... more The importance of remote observation and controlling has been rapidly increased in recent years due to the evolution of mobility. Since mobile phones have become pre dominant at present, quite ubiquitous and increasingly sophisticated, the integration of the mobile phone and a surveillance system becomes more meaningful. This research explored possible ways of implementing such system over existing mobile phone infrastructure without any other third party service providers. However, this reveals the important of integration of mobile phone and embedded system over generic interface such as USB. Additionally, it addresses the design and the implementation of such home security system. It reveals about challenges that occurring while using several technologies simultaneously though they individually work properly. Further it converses about importance, limitations and challenges of synchronizing several functions together such as reading and writing via serial port of a microcontrolle...
Automatic Vehicle number plate recognition (AVNR) is a very popular and highly demanding in trans... more Automatic Vehicle number plate recognition (AVNR) is a very popular and highly demanding in transportation industry, law and enforcement such as automating fines for traffic rule violations, automating parking lots, entry and exit in highways, quickly identifying granted vehicles. Most of the AVNRs use image processing techniques such as image enhancement, restoration, segmentations, block-based character recognition, optical character recognition and template matching. This paper presents the design and implementation of such a system to General Sir John Kotelawala Defence University (KDU) to capture and recode vehicle logs. People face difficulties at the gate premises due to the existing manual system. To collect the data, qualitative research techniques such as interviews and observations were used. Once an image captured, median filters were used to remove noises. Sharpen filters used to detect edges. Camera calibration was used to correct the perspective view. Lines were detec...
2019 International Research Conference on Smart Computing and Systems Engineering (SCSE), 2019
Disorganized city planning and a huge rise in use of automobiles on the road have caused massive ... more Disorganized city planning and a huge rise in use of automobiles on the road have caused massive traffic congestion in cities across the world. Pedestrian crossing designed to facilitate movement across the road network, have unfortunately become a hindrance to movements of traffic. Though the smart zebra lines had been introduced, it has not contributed much to reduce the time that holds vehicle lines under the traffic lights. Moreover, the establishment of transfer hubs and underground crossings remain silent in local context because of their cost. Even though there are plenty of pedestrian crossing mechanisms available, they are not secure and not ideal for the disabled, elderly, children, and the sick. Considerable numbers of police officers have to spend their time on traffic controlling duties though it’s inefficient and wastage of human resources. A number of studies have focused on automated vehicles and robots as tools to ease problems of congestion. This paper, it focuses ...
This paper presents the low cost autonomous logistic trolley for factory automation. Automation c... more This paper presents the low cost autonomous logistic trolley for factory automation. Automation can be defined as the technology by which a process or procedure is performed without human assistance. Factory automation has automated the factory manufacturing process without human interaction. It will increase the efficiency of the manufacturing process, make the process highly accurate and because of less man power it will increase the revenue margin of the factory. The system primarily consists of a Arduino Uno board, ultrasound sensors, infrared proximity sensors, Bluetooth modules, DC motors, and Servo motors. This system mainly includes obstacle detection, line tracking, Bluetooth request transferring technologies and motion control technologies. This trolley is called up by a production desk of the factory if materials are needed, by sending a request. Trolley automatically deliveres the material to that exact production desk using its infrared sensors that are placed at both l...
Diabetes is one of deadliest diseases in the world. As per the existing system in Sri Lanka, pati... more Diabetes is one of deadliest diseases in the world. As per the existing system in Sri Lanka, patients have to visit a diagnostic center, consult their doctor and wait for a day or more to get their result. Moreover, every time they want to get their diagnosis report, they have to waste their money in vain. But with the rise of Machine Learning approaches, we have been able to find a solution to this problem using data mining. Data mining is one of the key areas of Machine learning. It plays a significant role in diabetes research because It has the ability to extract hidden knowledge from a huge amount of diabetes related data. The aim of this research is to develop a system which can predict whether the patient has diabetes or not. Furthermore, predicting the disease early leads to treatment of the patients before it becomes critical. This research has focused on developing a system based on three classification methods namely, Decision Tree, NaĂ¯ve Bayes and Support Vector Machine ...
The word mushroom may mean different things to different people in different countries. Mushrooms... more The word mushroom may mean different things to different people in different countries. Mushrooms can be used as food, tonics, medicines, cosmeceuticals, and as natural biocontrol agents in plant protection with insecticidal, fungicidal, bactericidal, herbicidal, and nematocidal activities. Plant growth is affected by various factors. The most important factors for the quality and productivity of plant growth are temperature, humidity and light. This research presents the design and implementation of a smart system based on the wireless sensor network for monitoring and controlling mushroom growing conditions for farmers. The system contains five main units; namely sensing, transmission, decision making, controlling and monitoring. The system contains two main unit named as transceiver unit and receiver unit. The humidity sensor, temperature sensor and soil moisture sensor measure current environment condition and send the sensed value to the receiver unit using ZigBee. Then the Zig...
Detection of obstacles during navigation of a mobile robot is considered difficult due to varying... more Detection of obstacles during navigation of a mobile robot is considered difficult due to varying nature in terms of size, shape and location of the obstacle as well as ambient light that interferes with infra-red (IR) signals of the robot. In this paper, we propose a novel low-cost method that successfully guides a robot along a path using image processing and IR sensor circuits. A high continuous IR signal is converted into a low continuous IR signal by means of a demodulation circuit that enables a peripheral interface controller to receive this low continuous IR signal and take relevant decisions based on the signal. The images taken from a web camera are preprocessed to remove noise and detect edges. Subsequently, an image processing routine effectively calculates the angle to be rotated of the front wheels using a scan line algorithm. A minimum mean distance error of 2.45 was observed in tracking the path at a signal-to-nose ratio of 26.50. The accuracy of speech recognition w...
The main intent of the research is to develop an automated application that can determine the Not... more The main intent of the research is to develop an automated application that can determine the Nottingham Histologic Score of a given input histopathological image obtained from breast cancer or healthy tissues with DenseNet based architecture. In this study, we were able to obtain more than 94% accuracy rates for each trained model including 2-predict, 3-predict, and 4-predict networks.
Kasun K. Jinasena kasun@sjp.ac.lk Faculty of Applied Science University of Sri Jayewardenepura Ga... more Kasun K. Jinasena kasun@sjp.ac.lk Faculty of Applied Science University of Sri Jayewardenepura Gangodawila, Nugegoda, Sri Lanka Ravinda G.N. Meegama rgn@dscs.sjp.ac.lk Department of Statistics & Computer Science Faculty of Applied Science University of Sri Jayewardenepura Gangodawila, Nugegoda, Sri Lanka
Business projects are one of the major pillars of the economy of any country. People may have exc... more Business projects are one of the major pillars of the economy of any country. People may have excellent business ideas, but they may not have money to start them. Getting a loan may not be an easy task for a novice businessman. On the other hand, there can be many people who are seeking investment opportunities. However, they may not have sufficient funds to invest in business alone. When investing as groups, conflicts in negotiations will rise. Moreover, the issue of trust will increase. This research, we are proposing a new crowdfunding and decision-making platform for major projects in public and private sectors using blockchain technology. A businessman can submit his business plan and invite people to invest in if they like the given agreement. Investors can invest any amount and propositionally attend on decision making of each activity in the project by casting their votes. This platform helps to invest in large business projects over the lack of trust and issues of the existing investment methods. Because the reliability and the security of the system are higher as the agreement and the votes are written in the distributed ledger permanently, and decision-making happens without the involvement of humans.
A large part of society today does not trust decision making in government policies and projects.... more A large part of society today does not trust decision making in government policies and projects. It is time to move into new technology such as decision making on government policies and projects using the latest technology like blockchain and advanced cryptography. Building of blockchain-based secure, reliable, and distributed voting system for decision making in government policies and projects has been a challenge for a long time. Distributed ledger technologies are exciting technology advancement in the information technology world. Blockchain-based technologies offer an infinite range of applications that benefit from sharing economies of scale. The purpose of this research paper is to evaluate the use of blockchain as the implementation of distributed electronic voting systems for decision making on government policies and projects. More generally, this article assesses the potential of distributed ledger technologies in improves security by implementing an election process and blockchain-based application. This technology will be benefited to Grama sewa officers who will give correct vote. Because country like Sri Lanka we have 14020 Grama sewa regions. Each member get a chance to cast his vote. One vote for each project, it can be changed before the due date and only the last one can be counted. The grama sewa officer who cast his vote cannot be tracked, but the officer can cast a unique vote. After a while, the officer may join a fund or a fine. Voting on government policies or projects is mandatory and officer cannot prevent it. This will help to get the best option for government policies or projects.
Breast cancer can be recognized as one of the most well-known and life-threatening cancers impact... more Breast cancer can be recognized as one of the most well-known and life-threatening cancers impacting women and this has been identified as the second most common cancer across the world. According to registered data, there were over 2 million newly reported cases in 2020. The Deep Convolutional Neural Network has been identified as one of the most dominant and powerful deep learning approaches involved in the analysis of visual imagination. There are many shreds of evidence that indicate the appropriateness of this in medical imaging including breast cancer detection, classification, and segmentation with higher accuracy rates. The main intent of the research is to develop an automated application that can determine the Nottingham Histologic Score of a given input histopathological image obtained from breast cancer or healthy tissues with DenseNet based architecture. Healthy or benign tissues are categorized as zero and cancerous tissues are categorized based on the grade obtained as one, two, or three. In this study, we were able to obtain more than 94% accuracy rates for each trained model including 2-predict, 3-predict, and 4-predict networks. Further, a desktop-based inference tool that allows us to perform breast cancer grading was also developed as a result of this study.
Uploads
Papers by Kasun Jinasena