2024-03-28T14:24:21Z
http://journals.sjp.ac.lk/index.php/jcs/oai
oai:ojs.pkp.sfu.ca:article/1103
2024-03-28T14:24:21Z
jcs:ART
"131007 2013 eng "
2362-0110
dc
Profiled M-advertising Framework for Consumer Advertising
Gangabada, G.L.P.N.
Faculty of IT, University of Moratuwa
Premaratne, S. C.
Faculty of IT, University of Moratuwa
Mobile advertising and profiled advertising has become major discussion topics recently. With rapid development of mobile technology in the last decade, many e-business organizations are trying to combine the latest mobile technologies with customer profiling in order to increase the reachability of their product information among the target market. This paper presents a potential mechanism to enhance such mobile advertising by improving existing user profile methods. The main goal of this research is to introduce a novel user profiling mechanism that can be used to improve the productivity of a mobile advertising system. The proposed system is capable of providing additional information such as video, audio, etc. about advertisements to the user while giving profile-based and proximity suggestions.
University of Sri Jayewardenepura
2013-10-11 10:52:10
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/1103
Journal of Computer Science; Vol. 1 No. 1 (2013)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1104
2024-03-28T14:24:21Z
jcs:ART
"131007 2013 eng "
2362-0110
dc
Dynamic Object Path Detection in a Network of Surveillance Cameras
Weerasena, H.H.
Department of Information Technology, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
Bandara, P. B. S.
Department of Information Technology, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
Kulasekara, J.R.B.
Dassanayake, B. M. B.
Niroshika, U. A. A.
Department of Information Technology, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
Wijenayake, P.R.
Today, automated camera surveillance systems play a major role in securing public and private premises to ensure security and to reduce crime by detecting behavioral changes of moving objects. The important goal of such a surveillance system is to reduce human intervention while at the same time, provide accurate detection of moving objects. Many researchers have attempted to automate different aspects of camera surveillance such as tracking humans, traffic controlling, ground surveillance, etc. However, a system that overcomes overall difficulties that arise in the task of object detection and object tracking has not been developed because of high variance in the problem domain. The proposed system tracks the path of a locked object through a network of cameras. In contrast to traditional methods where the operators have to switch the screens manually to find the target objects, the proposed technique, once locked to an object; automatically tracks it through a camera network and generates the path on a map. We propose to use stereo cameras to enhance the detection and tracking of objects in 3D space.
University of Sri Jayewardenepura
2013-10-11 10:52:10
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/1104
Journal of Computer Science; Vol. 1 No. 1 (2013)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1616
2024-03-28T14:24:21Z
jcs:ART
"131007 2013 eng "
2362-0110
dc
Finding Efficient Linguistic Feature Set for Authorship Verification
Ranatunga, Sandaruwan Prabath Kumara
Sabaragamuwa University of Sri Lanka
Authorship verification rely on identification of a given document is written by a particular author or not. Internally analyzing the document itself with respect to the variations in writing style of the author and identification of the author’s own idiolect is the main context of the authorship verification. Mainly, the detection performance depends on the used feature set for clustering the document. Linguistic features and stylistic features have been utilized for author identification according to the writing style of a particular author. Disclose the shallow changes of the author’s writing style is the major problem which should be addressed in the domain of authorship verification. It motivates the computer science researchers to do research on authorship verification in the field of computer forensics and this research also focuses this problem. The contributions from the research are two folded: Former is introducing a new feature extracting method with Natural Language Processing (NLP) and later is propose a new more efficient linguistic feature set for verification of author of the given document. Experiments on a corpus composed of freely downloadable genuine 19th century English Books and Self Organizing Maps has been used as the classifier to cluster the documents. Proper word segmentation also introduced in this work and it helps to demonstrate that the proposed strategy can produced promising results. Finally, it is realized that more accurate classification is generated by the proposed strategy with extracted linguistic feature set.
University of Sri Jayewardenepura
2013-10-11 10:52:10
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/1616
Journal of Computer Science; Vol. 1 No. 1 (2013)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1621
2024-03-28T14:24:21Z
jcs:ART
"131011 2013 eng "
2362-0110
dc
Free and Open Source Software Technology Adoption in the Sri Lankan Banking Industry
Perera, K.A. Chandralal
Ceylon Electricity Board
Weerawarna, Shahani
University of Moratuwa
This research explores Free and Open Source Software (FOSS) adoption in the Sri Lankan banking sector. It produces two types of results, which are unique. One is an 8-level abstract model based on the criticality for the business, which represents all the software application usage in Sri Lankan banks. Then it presents the adoption of FOSS in banks, in terms of two quantified indices, namely General FOSS Adoption Index and Category Specific FOSS Adoption Index. The first index modeled so that it represents the ‘strategic nature of usage of FOSS’ as well as the ‘FOSS friendliness’ within the bank. The second index represents the FOSS adoption in the bank, in terms of extraction of the ‘best technological features out of them’ and the ‘level of adoption’. The results reveal that the Sri Lankan banks do not have good levels of FOSS adoption, though all the banks use FOSS applications for some purpose or another. By further drill down into the model, it was discovered that the lack of government policy initiative towards FOSS has had a causal effect on the poor adoption ratings in the Sri Lankan banking context. Further it will greatly helpful to have FOSS supportive software business in the country, which will influence banks to get better service for FOSS products.
University of Sri Jayewardenepura
2013-10-11 10:52:10
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/1621
Journal of Computer Science; Vol. 1 No. 1 (2013)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1815
2024-03-28T14:24:21Z
jcs:ART
"131007 2013 eng "
2362-0110
dc
Coronary Heart Event Analysis with Association Rule Mining
Gomathy, B.
Department of CSE, Bannari Amman Institute of Technology, Sathyamangalam
Ramesh, S.M.
Department of ECE, Bannari Amman Institute of Technology, Sathyamangalam
Shanmugam, A.
Department of ECE, Bannari Amman Institute of Technology, Sathyamangalam
Coronary heart disease (CHD) is one of the major causes of disability in adults as well as one of the main causes of death in the developed countries. Although significant progress has been made in the diagnosis and treatment of CHD, further investigation is still needed. The objective of this study was to develop the assessment of heart event-risk factors targeting in the reduction of CHD events using Association Rule Mining. The risk factors investigated were: 1) before the event: a) non modifiable—age, sex, and family history for premature CHD, b) modifiable—smoking before the event, history of hypertension, and history of diabetes; and 2) after the event: modifiable—smoking after the event, systolic blood pressure, diastolic blood pressure, total cholesterol, high density lipoprotein, low-density lipoprotein, triglycerides, and glucose. The events investigated were: myocardial infarction (MI), percutaneous coronary intervention (PCI), and coronary artery bypass graft surgery (CABG).Data-mining analysis was carried out using the Association Rule Mining for the afore mentioned three events using five different splitting criteria for larger datasets. The most important risk factors, as extracted from the classification rules analysis were: 1) for MI, age, smoking, and history of hypertension; 2) for PCI, family history, history of hypertension, and history of diabetes; and 3) for CABG, age, history of hypertension, and smoking. It is anticipated that data mining could help in the identification of high and low risk subgroups of subjects, a decisive factor for the selection of therapy, i.e., medical or surgical.
University of Sri Jayewardenepura
2013-10-11 10:52:10
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/1815
Journal of Computer Science; Vol. 1 No. 1 (2013)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1851
2024-03-28T14:24:21Z
jcs:ART
"160716 2016 eng "
2362-0110
dc
Health Care Workers’ Use Of Electronic Hospital Information System And Their Computer Literacy At The Outpatient Department In District General Hospital Trincomalee In Sri Lanka
Jayawardena, Ayanthi Saranga
Deputy Medical Superintendent
District Base Hospital
Panadura
Wickramasinghe, S.C.
Consultant Community Physician and Director (Planning), Address: Ministry of Health & Nutrition, Suwasiripaya, Rev.Baddegama Wimalawansa Mawatha, Colombo 10, Sri Lanka
Wimalaratne, S.R.U.
Consultant Community Physician and Director (Health Information),
Address: Ministry of Health & Nutrition, Suwasiripaya, Rev. Baddegama Wimalawansa Mawatha, Colombo 10, Sri Lanka
Abstract
Objectives:To describe the use of Electronic Hospital Information System(EHIS) by the staff, to assess the competency of them to handle the EHIS and to assess the computer literacy among health care workers at the Out Patient’s Department(OPD) in District General Hospital(DGH) Trincomalee.Study design:A cross sectional descriptive study. A competency assessment test and a self administered questionnaire were used. Participants: All the staff members operating the EHIS at the OPD in DGH Trincomalee. Results: Regarding the general use of the EHIS medical officers (100%) used the EHIS to write prescriptions,(>70%)to get the patient’s socio-demographic details, enter patient’s history to retrieve previous medical records, to obtain what drugs available and what drugs out of stock at the outdoor pharmacy, for notification of diseases and used less frequently to get the laboratory reports (50-70%). The system was used for 17 tasks out of 20 tasks and most unused tasks were write the diagnosis according to the ICD-10. Nurses and attendents used the system less than half of the tasks for which the system was functional. The pharmacists use of the system was optimal. Overall respondents’ competency of using the system were high (>80%). Conclusions: Majority of staff members had low level of computer literacy. Majority of them used the system successfully. Recommendations: To strengthen the training program,combat several constraints and upgrade the system, provide digital X-ray imaging and download them to CDs and improved to write the diagnosis according to the ICD-10.
Key words: Electronic Hospital Information System, Multi Disease Surveillance, Computer Literacy.
University of Sri Jayewardenepura
2016-07-16 14:40:08
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/1851
Journal of Computer Science; Vol. 2 No. 1 (2016)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/2721
2024-03-28T14:24:21Z
jcs:ART
"160716 2016 eng "
2362-0110
dc
A Novel Text Steganographic Technique Using Specific Alphabets
Htet, May
Mandalay Technological University
Phyo, Su Wai
Department of Computer Engineering and Information Technology/Mandalay Technological University, Mandalay
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text.
University of Sri Jayewardenepura
2016-07-16 14:40:08
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/2721
Journal of Computer Science; Vol. 2 No. 1 (2016)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/2722
2024-03-28T14:24:21Z
jcs:ART
"160716 2016 eng "
2362-0110
dc
Angle-Aware Greedy Forwarding Algorithm for Vehicular Ad Hoc Networks
Minn, Aye Zarchi
Department of Computer Engineering and Information Technology, Mandalay Technological University(MTU), Mandalay
Oo, May Zin
Department of Computer Engineering and Information Technology, Mandalay Technological University(MTU), Mandalay
Greedy Perimeter Stateless Routing (GPSR) gives the good forwarding nodes for Mobile Ad Hoc Networks (MANET) but does not provide the right directional forwarding nodes in Vehicular Ad Hoc Network (VANET). This is the fact that MANET uses the nodes without limitations in moving but VANET uses fixed infrastructure in mobility such as roads with lanes. The key of original greedy forwarding is choosing the forwarding node with the shortest distance between the source and the destination. It does not consider the direction of the forwarding nodes, which possibly cause the selected forwarding node going opposite direction from the destination. This paper thus tries to improve the greedy forwarding method of Greedy Perimeter Stateless Routing (GPSR) by taking into considerations in both the distance and the direction. Moreover it shows the mystery of angle that gives the right direction. The optimized GPSR (OGPSR) using improved greedy forwarding provides the better throughput, average end-to-end delay and routing overheads than the original GPSR.
University of Sri Jayewardenepura
2016-07-16 14:40:08
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/2722
Journal of Computer Science; Vol. 2 No. 1 (2016)
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/2747
2018-11-02T11:06:22Z
jcs:ART
"181102 2018 eng "
2362-0110
dc
An Expert System to Simplify the Management of Human Resources Mobility
Otman, Abdoun
Pluridisciplinary Laboratory, Polydisciplinary Faculty, Abdelmalk Essaadi University, Larache, Morocco
In this paper, we interest to present an expert system to simplify the management the human resources mobility within a multi-sites enterprise. This expert system uses new methods to solve a complex problem of spatial mobility of Human resources witch is studied in works [01] and [02]. In this system, we incorporate algorithm based on bilateral permutation (transposition) algorithm, circular permutation algorithm and factious (virtual) post algorithm in order to simplify the management of Human resources mobility. The goal is improving the mobility rate, to reduce the number of operations, resulting in a significant reduction of computation time. We will apply this system on practical examples and the results obtained will be show the advantage of using it.
University of Sri Jayewardenepura
2018-11-02 16:36:22
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/2747
Journal of Computer Science; Vol. 3 No. 1 (2018): Journal of Computer Science
eng
Copyright (c) 2018 Journal of Computer Science
oai:ojs.pkp.sfu.ca:article/3000
2018-11-02T11:06:22Z
jcs:RC
"181102 2018 eng "
2362-0110
dc
Towards a Framework for Integration of User-Centered Design and Agile Methodology
Taslim, Asma
ABSTRACT
Agile practices are release planning, sprint planning, and standup meetings. The Agile provides the requisite time and space for teams, enabling them, to collaborate with each other and build relationship among them. Frequent short meetings are being held daily by Agile teams to identify potential collaboration opportunities to be followed. User Centered Design (UCD) is a user interface design process which lays great emphasis on the usability objectives, user features, environmental circumstances, tasks and work input/flow in the design/model of an interface. However, some challenges occurred when the UCD joins the Agile process such as usability issues, collaboration problems, usability testing etc. The proposed model not only embraces the relevant issues but it resolves the same to a great extent. The evaluation of said model is done through a case study.
University of Sri Jayewardenepura
2018-11-02 16:36:22
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/3000
Journal of Computer Science; Vol. 3 No. 1 (2018): Journal of Computer Science
eng
Copyright (c) 2018 Journal of Computer Science
oai:ojs.pkp.sfu.ca:article/3439
2018-11-02T11:06:22Z
jcs:ART
"181102 2018 eng "
2362-0110
dc
BACK-NAVIGATION STRING MATCHING ALGORITHM (BSMA)
Matthias, Daniel
Rivers State University, Nkpolu-Oroworukwo, Port Harcourt, Nigeria
This research took a comparative analysis on string matching algorithms. The study focused on developing an efficient algorithm (Back-navigation String matching algorithm) which will be used for large documents. The algorithm whilst compared to the existing system introduced a pattern of search which was done backwardly, from the last character to the first. The existing system considered more number of shifts which was slow and has a bad character shift. The research aimed at developing an efficient string matching for large documents sorting. The research methodology adopted for this project research is the verification and validation methodology which perform its test in a reverse manner so the software developer can at each stage review its step. The proposed system was executed and produced a result which compared with the existing system was termed efficiency. The system introduces a faster means of searching which starts form the last character to the first. The developed system which is the efficient string matching algorithm was analyzed and displayed a faster means of searching documents and is termed efficient because of its computing speed of 2 milliseconds while the naïve algorithm which ran with the computing speed of 154 milliseconds for a total number of 5000 characters.
University of Sri Jayewardenepura
2018-11-02 16:36:22
application/pdf
http://journals.sjp.ac.lk/index.php/jcs/article/view/3439
Journal of Computer Science; Vol. 3 No. 1 (2018): Journal of Computer Science
eng
Copyright (c) 2018 Journal of Computer Science