[
    {
        "title": "A Retinex based GAN Pipeline to Utilize Paired and Unpaired Datasets for Enhancing Low Light Images",
        "venue": "MERcon",
        "year": "2020",
        "abstract": "Low light image enhancement is an important challenge for the development of robust computer vision algorithms. The machine learning approaches to this have been either unsupervised, supervised based on paired dataset or supervised based on unpaired dataset. This paper presents a novel deep learning pipeline that can learn from both paired and unpaired datasets. Convolution Neural Networks (CNNs) that are optimized to minimize standard loss, and Generative Adversarial Networks (GANs) that are optimized to minimize the adversarial loss are used to achieve different steps of the low light image enhancement process. Cycle consistency loss and a patched discriminator are utilized to further improve the performance. The paper also analyses the functionality and the performance of different components, hidden layers, and the entire pipeline.",
        "authors": [
            "Harshana Weligampola",
            "Gihan Jayatilaka",
            "Suren Sritharan",
            "Roshan Goldaliyadda",
            "Parakrama Ekanayeka",
            "Roshan Ragel",
            "Vijitha Herath"
        ],
        "author_info": [
            {
                "name": "Harshana Weligampola",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Gihan Jayatilaka",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/158/",
                "type": "STUDENT",
                "id": "E/14/158",
                "email": "gihanjayatilaka@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14158.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/158/"
            },
            {
                "name": "Suren Sritharan",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/339/",
                "type": "STUDENT",
                "id": "E/14/339",
                "email": "e14339@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14339.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/339/"
            },
            {
                "name": "Roshan Goldaliyadda",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Parakrama Ekanayeka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Vijitha Herath",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon50084.2020.9185373",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/2006.15304.pdf",
        "pdf_url": "#",
        "presentation_url": "https://www.cs.umd.edu/~gihan/projects/fyp/mercon-2020-presentation.pdf",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computer Vision"
        ],
        "tags": [
            "Low-light image enhancement",
            "Retinex theory",
            "Generative adversarial networks",
            "Cycle consistency",
            "Computer Vision"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon50084.2020.9185373/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon50084.2020.9185373/index.json",
        "submitted": "2022/05/13 12:26:29"
    },
    {
        "title": "Non-contact Infant Sleep Apnea Detection",
        "venue": "IEEE International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2019",
        "abstract": "Sleep apnea is a breathing disorder where a person repeatedly stops breathing in sleep. Early detection is crucial for infants because it might bring long term adversities. The existing accurate detection mechanism (pulse oximetry) is a skin contact measurement. The existing non-contact mechanisms (acoustics, video processing) are not accurate enough. This paper presents a novel algorithm for the detection of sleep apnea with video processing. The solution is non-contact, accurate and lightweight enough to run on a single board computer. The paper discusses the accuracy of the algorithm on real data, advantages of the new algorithm, its limitations and suggests future improvements.",
        "authors": [
            "Gihan Jayatilaka",
            "Harshana Weligampola",
            "Suren Sritharan",
            "Pankayaraj Pathmanathan",
            "Roshan Ragel",
            "Isuru Nawinne"
        ],
        "author_info": [
            {
                "name": "Gihan Jayatilaka",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/158/",
                "type": "STUDENT",
                "id": "E/14/158",
                "email": "gihanjayatilaka@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14158.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/158/"
            },
            {
                "name": "Harshana Weligampola",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/379/",
                "type": "STUDENT",
                "id": "E/14/379",
                "email": "e14379@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14379.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/379/"
            },
            {
                "name": "Suren Sritharan",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/339/",
                "type": "STUDENT",
                "id": "E/14/339",
                "email": "e14339@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14339.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/339/"
            },
            {
                "name": "Pankayaraj Pathmanathan",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/237/",
                "type": "STUDENT",
                "id": "E/14/237",
                "email": "pankayaraj1995@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14237.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/237/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIIS47346.2019.9063269",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1910.04725.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computational BioEngineering",
            "Computer Vision"
        ],
        "tags": [
            "Sleep apnea",
            "Video processing",
            "Bio medical engineering",
            "Pattern recognition"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIIS47346.2019.9063269/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIIS47346.2019.9063269/index.json",
        "submitted": "2022/05/13 12:30:38"
    },
    {
        "title": "Chronic kidney disease prediction using machine learning methods",
        "venue": "2020 Moratuwa Engineering Research Conference (MERCon) - IEEE",
        "year": "2020",
        "abstract": "Chronic Kidney Disease (CKD) or chronic renal disease has become a major issue with a steady growth rate. A person can only survive without kidneys for an average time of 18 days, which makes a huge demand for a kidney transplant and Dialysis. It is important to have effective methods for early prediction of CKD. Machine learning methods are effective in CKD prediction. This work proposes a workflow to predict CKD status based on clinical data, incorporating data prepossessing, a missing value handling method with collaborative filtering and attributes selection. Out of the 11 machine learning methods considered, the extra tree classifier and random forest classifier are shown to result in the highest accuracy and minimal bias to the attributes. The research also considers the practical aspects of data collection and highlights the importance of incorporating domain knowledge when using machine learning for CKD status prediction.",
        "authors": [
            "Imesh Udara Ekanayake",
            "Damayanthi Herath"
        ],
        "author_info": [
            {
                "name": "Imesh Udara Ekanayake",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/092/",
                "type": "STUDENT",
                "id": "E/15/092",
                "email": "imeshuek@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15092.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/092/"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon50084.2020.9185249",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://www.researchgate.net/profile/Imesh-Ekanayake/publication/344319206_Chronic_Kidney_Disease_Prediction_Using_Machine_Learning_Methods/links/5f672571458515b7cf418d5b/Chronic-Kidney-Disease-Prediction-Using-Machine-Learning-Methods.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Machine Learning and Data Mining"
        ],
        "tags": [
            "Kidney",
            "Diseases",
            "Machine learning",
            "Red blood cells",
            "Hypertension"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon50084.2020.9185249/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon50084.2020.9185249/index.json",
        "submitted": "2022/05/15 13:05:36"
    },
    {
        "title": "Adaptive hierarchical clustering for hyperspectral image classification: Umbrella Clustering",
        "venue": "Journal of Spectral Imaging",
        "year": "2019",
        "abstract": "Hyperspectral Imaging (HSI) utilises the reflectance information of a large number of contiguous spectral bands to solve various problems. However, the relative proximity of spectral signatures among classes can be exploited to generate an adaptive hierarchical structure for HSI classification. This enables a level by level optimisation for clustering at each stage of the hierarchy. The Umbrella Clustering algorithm, introduced in this work, utilises this premise to significantly improve performance compared to non-hierarchical algorithms which attempt to optimise clustering globally. The key feature of the proposed methodology is that, unlike existing hierarchical algorithms which rely on fixed or supervised structures, the proposed method exploits a mechanism in spectral clustering to generate a self-organised hierarchy. The algorithm gradually zooms into the feature space to identify levels of clustering at each stage of the hierarchy. The results further demonstrate that the generated structure tallies with human perception. In addition, an improvement to Linear Discriminant Analysis (LDA) is also introduced to further improve performance. This modification maximises the pairwise class separation in the feature space. The entire algorithm includes this modified LDA step which requires a certain amount of class information in terms of features, at the training phase. The classification algorithm which incorporates all novel concepts was tested on the HSI data set of Pavia University as well the database of Common Sri Lankan Spices and Adulterants in order to assess the versatility of the algorithm.",
        "authors": [
            "S.S.P. Vithana",
            "E.M.M.B. Ekanayake",
            "E.M.H.E.B. Ekanayake",
            "A.R.M.A.N. Rathnayake",
            "G.C. Jayatilaka",
            "H.M.V.R. Herath",
            "G.M.R.I. Godaliyadda",
            "M.P.B. Ekanayake"
        ],
        "author_info": [
            {
                "name": "S.S.P. Vithana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "E.M.M.B. Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "E.M.H.E.B. Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "A.R.M.A.N. Rathnayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "G.C. Jayatilaka",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/158/",
                "type": "STUDENT",
                "id": "E/14/158",
                "email": "gihanjayatilaka@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14158.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/158/"
            },
            {
                "name": "H.M.V.R. Herath",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "G.M.R.I. Godaliyadda",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "M.P.B. Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1255/jsi.2019.a11",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://www.impopen.com/download.php?code=I08_a11",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "hyperspectral imagery",
            "spectral clustering",
            "hierarchical classification",
            "umbrella clustering",
            "feature extraction",
            "remote sensing",
            "linear discriminant analysis",
            "self-organise",
            "unsupervised"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1255/jsi.2019.a11/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1255/jsi.2019.a11/index.json",
        "submitted": "2022/05/17 09:13:04"
    },
    {
        "title": "Genopo: a nanopore sequencing analysis toolkit for portable Android devices",
        "venue": "Communications Biology",
        "year": "2020",
        "abstract": "The advent of portable nanopore sequencing devices has enabled DNA and RNA sequencing to be performed in the field or the clinic. However, advances in in situ genomics require parallel development of portable, offline solutions for the computational analysis of sequencing data. Here we introduce Genopo, a mobile toolkit for nanopore sequencing analysis. Genopo compacts popular bioinformatics tools to an Android application, enabling fully portable computation. To demonstrate its utility for in situ genome analysis, we use Genopo to determine the complete genome sequence of the human coronavirus SARS-CoV-2 in nine patient isolates sequenced on a nanopore device, with Genopo executing this workflow in less than 30\u00e2\u0080\u0089min per sample on a range of popular smartphones. We further show how Genopo can be used to profile DNA methylation in a human genome sample, illustrating a flexible, efficient architecture that is suitable to run many popular bioinformatics tools and accommodate small or large genomes. As the first ever smartphone application for nanopore sequencing analysis, Genopo enables the genomics community to harness this cheap, ubiquitous computational resource.",
        "authors": [
            "Hiruna Samarakoon",
            "Sanoj Punchihewa",
            "Anjana Senanayake",
            "Jillian M. Hammond",
            "Igor Stevanovski",
            "James M. Ferguson",
            "Roshan Ragel",
            "Hasindu Gamaarachchi",
            "Ira W. Deveson"
        ],
        "author_info": [
            {
                "name": "Hiruna Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/302/",
                "type": "STUDENT",
                "id": "E/14/302",
                "email": "e14302@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14302.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/302/"
            },
            {
                "name": "Sanoj Punchihewa",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/262/",
                "type": "STUDENT",
                "id": "E/14/262",
                "email": "e14262@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14262.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/262/"
            },
            {
                "name": "Anjana Senanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Jillian M. Hammond",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Igor Stevanovski",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "James M. Ferguson",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Hasindu Gamaarachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Ira W. Deveson",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1038/s42003-020-01270-z",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://www.nature.com/articles/s42003-020-01270-z.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computational BioEngineering"
        ],
        "tags": [
            "Genopo",
            "Nanopore Sequencing"
        ],
        "funding": "MRFF grant APP1173594 (to I.W.D.), Cancer Institute NSW Early Career Fellowship 2018/ECF013 (to I.W.D.) and philanthropic support from The Kinghorn Foundation (to I.W.D. and H.G.).",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1038/s42003-020-01270-z/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1038/s42003-020-01270-z/index.json",
        "submitted": "2022/05/24 23:14:25"
    },
    {
        "title": "GPU accelerated adaptive banded event alignment for rapid comparative nanopore signal analysis",
        "venue": "BMC Bioinformatics",
        "year": "2020",
        "abstract": "[BACKGROUND:] Nanopore sequencing enables portable, real-time sequencing applications, including point-of-care diagnostics and in-the-field genotyping. Achieving these outcomes requires efficient bioinformatic algorithms for the analysis of raw nanopore signal data. However, comparing raw nanopore signals to a biological reference sequence is a computationally complex task. The dynamic programming algorithm called Adaptive Banded Event Alignment (ABEA) is a crucial step in polishing sequencing data and identifying non-standard nucleotides, such as measuring DNA methylation. Here, we parallelise and optimise an implementation of the ABEA algorithm (termed f5c) to efficiently run on heterogeneous CPU-GPU architectures. [RESULTS:] By optimising memory, computations and load balancing between CPU and GPU, we demonstrate how f5c can perform \u00e2\u0088\u00bc3-5 \u00c3\u0097 faster than an optimised version of the original CPU-only implementation of ABEA in the Nanopolish software package. We also show that f5c enables DNA methylation detection on-the-fly using an embedded System on Chip (SoC) equipped with GPUs. [CONCLUSIONS:] Our work not only demonstrates that complex genomics analyses can be performed on lightweight computing systems, but also benefits High-Performance Computing (HPC). The associated source code for f5c along with GPU optimised ABEA is available at https://github.com/hasindu2008/f5c.",
        "authors": [
            "Hasindu Gamaarachchi",
            "Chun Wai Lam",
            "Gihan Jayatilaka",
            "Hiruna Samarakoon",
            "Jared T. Simpson",
            "Martin A. Smith",
            "Sri Parameswaran"
        ],
        "author_info": [
            {
                "name": "Hasindu Gamaarachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Chun Wai Lam",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Gihan Jayatilaka",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/158/",
                "type": "STUDENT",
                "id": "E/14/158",
                "email": "gihanjayatilaka@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14158.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/158/"
            },
            {
                "name": "Hiruna Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/302/",
                "type": "STUDENT",
                "id": "E/14/302",
                "email": "e14302@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14302.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/302/"
            },
            {
                "name": "Jared T. Simpson",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Martin A. Smith",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1186/s12859-020-03697-x",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.biorxiv.org/content/10.1101/756122v1.full.pdf",
        "pdf_url": "https://bmcbioinformatics.biomedcentral.com/track/pdf/10.1186/s12859-020-03697-x.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "https://github.com/hasindu2008/f5c",
        "research_groups": [
            "Accelerated and High-Performance Computing (FPGA / GPU)"
        ],
        "tags": [
            "Nanopore",
            "Signal alignment",
            "Event alignment",
            "Methylation",
            "GPU",
            "GPU acceleration",
            "Optimisation",
            "SoC",
            "Nanopolish",
            "f5c"
        ],
        "funding": "Jared T. Simpson is supported by the Ontario Institute for Cancer Research through funds provided by the Government of Ontario and the Government of Canada through Genome Canada and Ontario Genomics (OGI-136).",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1186/s12859-020-03697-x/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1186/s12859-020-03697-x/index.json",
        "submitted": "2022/06/02 22:53:17"
    },
    {
        "title": "An optical physics inspired CNN approach for intrinsic image decomposition",
        "venue": "2021 IEEE International Conference on Image Processing (ICIP)",
        "year": "2021",
        "abstract": "Intrinsic Image Decomposition is an open problem of generating the constituents of an image. Generating reflectance and shading from a single image is a challenging task specifically when there is no ground truth. There is a lack of unsupervised learning approaches for decomposing an image into reflectance and shading using a single image. We propose a neural network architecture capable of this decomposition using physics-based parameters derived from the image. Through experimental results, we show that (a) the proposed methodology outperforms the existing deep learning-based IID techniques and (b) the derived parameters improve the efficacy significantly. We conclude with a closer analysis of the results (numerical and example images) showing several avenues for improvement.",
        "authors": [
            "Harshana Weligampola",
            "Gihan Jayatilaka",
            "Suren Sritharan",
            "Parakrama Ekanayake",
            "Roshan Ragel",
            "Vijitha Herath",
            "Roshan Godaliyadda"
        ],
        "author_info": [
            {
                "name": "Harshana Weligampola",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Gihan Jayatilaka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Suren Sritharan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Parakrama Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Vijitha Herath",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Godaliyadda",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIP42928.2021.9506375",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/2105.10076",
        "pdf_url": "#",
        "presentation_url": "https://www.cs.umd.edu/~gihan/projects/fyp/icip-2021-presentation.pdf",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e14/dark-arts-algorithms-for-low-light-image-enhancement-and-interpretation/",
        "codebase": "#",
        "research_groups": [
            "Computer Vision"
        ],
        "tags": [
            "Reflectivity",
            "Neural networks",
            "Optical fiber networks",
            "Optical imaging",
            "Image decomposition",
            "Numerical models",
            "Optical reflection"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIP42928.2021.9506375/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIP42928.2021.9506375/index.json",
        "submitted": "2022/06/02 23:03:10"
    },
    {
        "title": "DeepLight: Robust & Unobtrusive Real-time Screen-Camera Communication for Real-World Displays",
        "venue": "2021 20th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)",
        "year": "2021",
        "abstract": "The paper introduces a novel, holistic approach for robust Screen-Camera Communication (SCC), where video content on a screen is visually encoded in a human-imperceptible fashion and decoded by a camera capturing images of such screen content. We first show that state-of-the-art SCC techniques have two key limitations for in-the-wild deployment: (a) the decoding accuracy drops rapidly under even modest screen extraction errors from the captured images, and (b) they generate perceptible flickers on common refresh rate screens even with minimal modulation of pixel intensity. To overcome these challenges, we introduce DeepLight, a system that incorporates machine learning (ML) models in the decoding pipeline to achieve humanly-imperceptible, moderately high SCC rates under diverse real-world conditions. DeepLight's key innovation is the design of a Deep Neural Network (DNN) based decoder that collectively decodes all the bits spatially encoded in a display frame, without attempting to precisely isolate the pixels associated with each encoded bit. In addition, DeepLight supports imperceptible encoding by selectively modulating the intensity of only the Blue channel, and provides reasonably accurate screen extraction (IoU values \u00e2\u0089\u00a5 83%) by using state-of-the-art object detection DNN pipelines. We show that a fully functional DeepLight system is able to robustly achieve high decoding accuracy (frame error rate < 0.2) and moderately-high data goodput (\u00e2\u0089\u00a50.95 Kbps) using a human-held smartphone camera, even over larger screen-camera distances (~ 2m).",
        "authors": [
            "Vu Tran",
            "Gihan Jayatilaka",
            "Ashwin Ashok",
            "Archan Misra"
        ],
        "author_info": [
            {
                "name": "Vu Tran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Gihan Jayatilaka",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/158/",
                "type": "STUDENT",
                "id": "E/14/158",
                "email": "gihanjayatilaka@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14158.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/158/"
            },
            {
                "name": "Ashwin Ashok",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Archan Misra",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1145/3412382.3458269",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/2105.05092",
        "pdf_url": "#",
        "presentation_url": "https://www.cs.umd.edu/~gihan/projects/deeplight/presentation.pdf",
        "project_url": "#",
        "codebase": "https://github.com/gihanjayatilaka/deeplight",
        "research_groups": [
            "Computer Vision"
        ],
        "tags": [
            "Human-centered computing",
            "Ubiquitous and mobile computing",
            "Computer systems organization",
            "Embedded and cyber-physical systems"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1145/3412382.3458269/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1145/3412382.3458269/index.json",
        "submitted": "2022/06/02 23:08:48"
    },
    {
        "title": "SAS-3: A polynomial based strong password authentication protocol",
        "venue": "2007 International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2007",
        "abstract": "As the Internet and mobile applications have been increasing in the recent past, the need for authentication over remote servers and telephones have become very important. The need of authentication is essential as the private data sent over the Internet has risk of being wiretapped. Existing password authentication schemes can be divided into two types, one that requires only the weak password and the other that requires the strong password. The main objective of this paper is to present a review on the strong password protocols and propose a new protocol with enhanced security features. In addition, we have proved that our SAS-3 (simple and secure) protocol is secure against replay, denial of service, impersonation and password guessing attacks with minimized computational and transmission overheads.",
        "authors": [
            "N. S. Weragama",
            "M. Sandirigama"
        ],
        "author_info": [
            {
                "name": "N. S. Weragama",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "M. Sandirigama",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/manjula-sandirigama/",
                "type": "STAFF",
                "id": "manjula.sandirigama",
                "email": "manjula.sandirigama@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/manjula-sandirigama.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/manjula-sandirigama/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2007.4579145",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Polynomials",
            "Authentication",
            "Protocols",
            "Computer crime",
            "Synthetic aperture sonar",
            "Information systems",
            "Internet",
            "Security",
            "Computer industry",
            "Mobile communication"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2007.4579145/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2007.4579145/index.json",
        "submitted": "2022/06/15 22:07:02"
    },
    {
        "title": "Security weaknesses of WEP protocol IEEE 802.11b and enhancing the security with dynamic keys",
        "venue": "2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH)",
        "year": "2009",
        "abstract": "In wireless data communication, security has become an important measure. In this paper, we reveal vulnerabilities and weaknesses of WEP protocol which is used in IEEE 802.11b. The major issue of WEP protocol is the lack of a proper key management technique. We propose a method to overcome above by introducing a dynamic key for authentication and data transmission on per data frame basis.",
        "authors": [
            "Manjula Sandirigama",
            "Rasika Idamekorala"
        ],
        "author_info": [
            {
                "name": "Manjula Sandirigama",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/manjula-sandirigama/",
                "type": "STAFF",
                "id": "manjula.sandirigama",
                "email": "manjula.sandirigama@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/manjula-sandirigama.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/manjula-sandirigama/"
            },
            {
                "name": "Rasika Idamekorala",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/TIC-STH.2009.5444462",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)",
            "Nextgen Networks"
        ],
        "tags": [
            "Authentication",
            "Cryptography",
            "Data security",
            "Random number generation",
            "Computer security",
            "Communication system security",
            "Data communication",
            "Access protocols",
            "Computer hacking",
            "Information security"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/TIC-STH.2009.5444462/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/TIC-STH.2009.5444462/index.json",
        "submitted": "2022/06/15 22:09:22"
    },
    {
        "title": "Tile optimization for area in FPGA based hardware acceleration of peptide identification",
        "venue": "2011 6th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2011",
        "abstract": "Advances in life sciences over the last few decades have lead to the generation of a huge amount of biological data. Computing research has become a vital part in driving biological discovery where analysis and categorization of biological data are involved. String matching algorithms can be applied for protein/gene sequence matching and with the phenomenal increase in the size of string databases to be analyzed, software implementations of these algorithms seems to have hit a hard limit and hardware acceleration is increasingly being sought. Several hardware platforms such as Field Programmable Gate Arrays (FPGA), Graphics Processing Units (GPU) and Chip Multi Processors (CMP) are being explored as hardware platforms. In this paper, we give a comprehensive overview of the literature on hardware acceleration of string matching algorithms, we take an FPGA hardware exploration and expedite the design time by a design automation technique. Further, our design automation is also optimized for better hardware utilization through optimizing the number of peptides that can be represented in an FPGA tile. The results indicate significant improvements in design time and hardware utilization which are reported in this paper.",
        "authors": [
            "SM Vidanagamachchi",
            "SD Dewasurendra",
            "Roshan G Ragel",
            "M Niranjan"
        ],
        "author_info": [
            {
                "name": "SM Vidanagamachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "SD Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "M Niranjan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2011.6038056",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/ftp/arxiv/papers/1403/1403.7296.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Peptides",
            "Field programmable gate arrays",
            "Tiles",
            "Hardware",
            "Software algorithms",
            "Proteins",
            "Software"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2011.6038056/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2011.6038056/index.json",
        "submitted": "2022/06/15 22:42:11"
    },
    {
        "title": "Design and implementation of a statechart based reconfigurable elevator controller",
        "venue": "2011 6th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2011",
        "abstract": "This paper presents a simple and clear method to design and implement a reconfigurable elevator controller using an FPGA, which can be implemented for an elevator with any (N) number of floors, with specified inputs and outputs. A model based design approach was followed. We started from a state chart model developed for a prototype elevator with three floors. Extension of the model for a variable number of floors was considered. Controller for the prototype system was implemented in ladder logic on a PLC and the limitations of that approach with regard to re-configurability were identified: viz., in the extension of elevator controller for `N' no of floors. Next VHDL code was developed for a reconfigurable elevator controller where, by changing a variable corresponding to the required number of floors, the suitable code can be generated. The controller thus generated can be implemented in an FPGA. The method was successfully tested on a Xilinx Spartan 3AN FPGA.",
        "authors": [
            "HPAP Jayawardana",
            "HWKM Amarasekara",
            "PTS Peelikumbura",
            "WAKC Jayathilaka",
            "SG Abeyaratne",
            "SD Dewasurendra"
        ],
        "author_info": [
            {
                "name": "HPAP Jayawardana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "HWKM Amarasekara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "PTS Peelikumbura",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "WAKC Jayathilaka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "SG Abeyaratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "SD Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2011.6038093",
        "is_dept_affiliated": true,
        "preprint_url": "https://d1wqtxts1xzle7.cloudfront.net/50495911/Statechart_Based_Modeling_and_Controller20161123-13291-x6486x-with-cover-page-v2.pdf?Expires=1655316738&Signature=J87I1-hyT7c4dZMcZFbVzExNgXZan8pPdpf-tAbTr80ahZDXcN~FV3gELQzG0thDbQQzIWw8NO7EXdXyX8QOacT1vJF5k04SF7MiO~Hl5H9A22rQ92fq-zua3GQrPRZUcJw629dQfP7Nbxn8tks6AGF6Z3fkFkLMeOpVqI2yHydXmCL5kHYOwKTiMYMS-eJ~OI3JQ18eVsSvJ530OxjoFisczkUiU-ZxqohOWx00L~JgJCvLZxAwtrPpxvA8ROEOx2VA7xCFgfINIqFIuMTVMz7aghtL0oOuEFrJovRbisPfrVL6aQx-Q9HdpP5CeZCDXcJTH2sh8FZr2nDLpuC5VQ__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA",
        "pdf_url": "https://d1wqtxts1xzle7.cloudfront.net/50495911/Statechart_Based_Modeling_and_Controller20161123-13291-x6486x-with-cover-page-v2.pdf?Expires=1655316738&Signature=J87I1-hyT7c4dZMcZFbVzExNgXZan8pPdpf-tAbTr80ahZDXcN~FV3gELQzG0thDbQQzIWw8NO7EXdXyX8QOacT1vJF5k04SF7MiO~Hl5H9A22rQ92fq-zua3GQrPRZUcJw629dQfP7Nbxn8tks6AGF6Z3fkFkLMeOpVqI2yHydXmCL5kHYOwKTiMYMS-eJ~OI3JQ18eVsSvJ530OxjoFisczkUiU-ZxqohOWx00L~JgJCvLZxAwtrPpxvA8ROEOx2VA7xCFgfINIqFIuMTVMz7aghtL0oOuEFrJovRbisPfrVL6aQx-Q9HdpP5CeZCDXcJTH2sh8FZr2nDLpuC5VQ__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Elevators",
            "Floors",
            "Field programmable gate arrays",
            "Prototypes",
            "Sensors",
            "Mathematical model",
            "Control systems"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2011.6038093/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2011.6038093/index.json",
        "submitted": "2022/06/15 22:45:28"
    },
    {
        "title": "Statechart based modeling and controller implementation of complex reactive systems",
        "venue": "2011 6th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2011",
        "abstract": "Statechart formalism has been a preferred choice for modeling complex reactive systems (CRS) in recent years. It has inbuilt powerful features of orthogonality, hierarchy, intermodular communication and history. Once statechart based system modeling is done the next issues to be addressed are (1) modular verification of the system for failsafe operation under all possible working conditions (2) progressive controller implementation together with the supervisory control while maintaining traceability and re-configurability and (3) facilitation of controller adaptation for progressive incorporation of security features and supervisory specifications. An elevator system was designed and built to reflect exigencies of a typical CRS hardware/software platform. A controller was designed to meet the above requirements and tested on the platform to validate the feasibility of model-based control design/verification methodology for real scale systems. Modularity was achieved by developing the statechart model of the plant into a tree of communicating language generators. Progresively verified modules were then translated into sequential function charts (SFC) which were finally integrated to form a complete flat SFC. The SFC was then implemented on a PLC platform (Telemechanique). The program was first validated in simulation using Telemechanique \u00e2\u0080\u009cTwidosuite\u00e2\u0080\u009d for different operating conditions and finally tested on the elevator system.",
        "authors": [
            "AC Vidanapathirana",
            "SD Dewasurendra",
            "SG Abeyratne"
        ],
        "author_info": [
            {
                "name": "AC Vidanapathirana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "SD Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "SG Abeyratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2011.6038120",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Elevators",
            "Generators",
            "Software",
            "Automata",
            "Process control",
            "Floors",
            "Hardware"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2011.6038120/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2011.6038120/index.json",
        "submitted": "2022/06/15 22:47:30"
    },
    {
        "title": "Commentz-walter: Any better than aho-corasick for peptide identification?",
        "venue": "International Journal of Research in Computer Science",
        "year": "2012",
        "abstract": "An algorithm for locating all occurrences of a finite number of keywords in an arbitrary string, also known as multiple strings matching, is commonly required in information retrieval (such as sequence analysis, evolutionary biological studies, gene/protein identification and network intrusion detection) and text editing applications. Although Aho-Corasick was one of the commonly used exact multiple strings matching algorithm, Commentz-Walter has been introduced as a better alternative in the recent past. Comments-Walter algorithm combines ideas from both Aho-Corasick and Boyer Moore. Large scale rapid and accurate peptide identification is critical in computational proteomics. In this paper, we have critically analyzed the time complexity of Aho-Corasick and Commentz-Walter for their suitability in large scale peptide identification. According to the results we obtained for our dataset, we conclude that Aho-Corasick is performing better than Commentz-Walter as opposed to the common beliefs.",
        "authors": [
            "SM Vidanagamachchi",
            "SD Dewasurendra",
            "RG Ragel",
            "M Niranjan"
        ],
        "author_info": [
            {
                "name": "SM Vidanagamachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "SD Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "RG Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "M Niranjan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.7815/ijorcs.26.2012.053",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.academia.edu/download/73625856/Vol2-Issue-06-04-commentz-walter-any-better-than-aho-corasick-for-peptide-identification.pdf",
        "pdf_url": "https://www.academia.edu/download/73625856/Vol2-Issue-06-04-commentz-walter-any-better-than-aho-corasick-for-peptide-identification.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Aho-Corasick",
            "Commentz-Walter",
            "Peptide Identification"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.7815/ijorcs.26.2012.053/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.7815/ijorcs.26.2012.053/index.json",
        "submitted": "2022/06/15 22:52:01"
    },
    {
        "title": "Hardware software co-design of the Aho-Corasick algorithm: Scalable for protein identification?",
        "venue": "2013 IEEE 8th International Conference on Industrial and Information Systems",
        "year": "2013",
        "abstract": "Pattern matching is commonly required in many application areas and bioinformatics is a major area of interest that requires both exact and approximate pattern matching. Much work has been done in this area, yet there is still a significant space for improvement in efficiency, flexibility, and throughput. This paper presents a hardware software co-design of Aho-Corasick algorithm in Nios II soft-processor and a study on its scalability for a pattern matching application. A software only approach is used to compare the throughput and the scalability of the hardware software co-design approach. According to the results we obtained, we conclude that the hardware software co-design implementation shows a maximum of 10 times speed up for pattern size of 1200 peptides compared to the software only implementation. The results also show that the hardware software co-design approach scales well for increasing data size compared to the software only approach.",
        "authors": [
            "S.M. Vidanagamachchi",
            "S.D. Dewasurendra",
            "R.G. Ragel"
        ],
        "author_info": [
            {
                "name": "S.M. Vidanagamachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "S.D. Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "R.G. Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIInfS.2013.6732003",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/ftp/arxiv/papers/1403/1403.1317.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Hardware",
            "Proteins",
            "Peptides",
            "Software algorithms",
            "Program processors",
            "Algorithm design and analysis"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIInfS.2013.6732003/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIInfS.2013.6732003/index.json",
        "submitted": "2022/06/27 03:29:56"
    },
    {
        "title": "Model in the loop testing of complex reactive systems",
        "venue": "2013 IEEE 8th International Conference on Industrial and Information Systems",
        "year": "2013",
        "abstract": "Currently there is a new trend in the design of Complex Reactive Systems (CRS) towards model based development. Software components are no longer hard written in C or Assembler code but modeled with MATLAB/Simulink, Statemate or similar tools. Model based designs allow development of high level models that can be used for simulations in very early stages of the design process. However the quality assurance of model based developments, specially testing is still poorly supported [1]. In this paper we discuss the characteristics of model based design process and the need of quality assurance methods throughout the design process. We have selected a fully functional prototype passenger elevator as the CRS. A model based design approach is followed throughout the design phase. Model-in-the loop (MiL) testing is carried out as the quality assurance technique and the results are presented. Then the translation of the MiL test into a Hardware-in the-loop (HiL) test is presented.",
        "authors": [
            "A. Vidanapathirana",
            "S. D. Dewasurendra",
            "S. G. Abeyaratne"
        ],
        "author_info": [
            {
                "name": "A. Vidanapathirana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "S. D. Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "S. G. Abeyaratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIInfS.2013.6731950",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Mathematical model",
            "Induction motors",
            "Testing",
            "MATLAB",
            "Elevators",
            "Floors"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIInfS.2013.6731950/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIInfS.2013.6731950/index.json",
        "submitted": "2022/06/27 03:32:02"
    },
    {
        "title": "Hardware accelerated protein inference framework",
        "venue": "2013 IEEE 8th International Conference on Industrial and Information Systems",
        "year": "2013",
        "abstract": "Protein inference plays a vital role in the proteomics study. Two major approaches could be used to handle the problem of protein inference; top-down and bottom-up. This paper presents a framework for protein inference, which uses hardware accelerated protein inference framework for handling the most important step in a bottom-up approach, viz. peptide identification during the assembling process. In our framework, identified peptides and their probabilities are used to predict the most suitable reference protein cluster for a given input amino acid sequence with the probability of identified peptides. The framework is developed on an FPGA where hardware software co-design techniques are used to accelerate the computationally intensive parts of the protein inference process. In the paper we have measured, compared and reported the time taken for the protein inference process in our framework against a pure software implementation.",
        "authors": [
            "S. M. Vidanagamachchi",
            "S. D. Dewasurendra",
            "R. G. Ragel"
        ],
        "author_info": [
            {
                "name": "S. M. Vidanagamachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "S. D. Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "R. G. Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIInfS.2013.6732061",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1403.1319",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Proteins",
            "Peptides",
            "Hardware",
            "Tiles",
            "Software",
            "Field programmable gate arrays",
            "Acceleration"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIInfS.2013.6732061/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIInfS.2013.6732061/index.json",
        "submitted": "2022/06/27 03:34:23"
    },
    {
        "title": "A structured hardware software architecture for peptide based diagnosis \u00e2\u0080\u0094 Sub-string matching problem with limited tolerance",
        "venue": "2014 7th International Conference on Information and Automation for Sustainability",
        "year": "2014",
        "abstract": "The problem of inferring proteins from complex peptide samples in shotgun proteomic workflow sets extreme demands on computational resources in respect of the required very high processing throughputs, rapid processing rates and reliability of results. This is exacerbated by the fact that, in general, a given protein cannot be defined by a fixed sequence of amino acids due to the existence of splice variants and isoforms of that protein. Therefore, the problem of protein inference could be considered as one of identifying sequences of amino acids with some limited tolerance. Two problems arise from this: a) due to these (permitted) variations, the applicability of exact string matching methodologies could be questioned and b) the difficulty of defining a reference (peptide/amino acid) sequence for a particular set of proteins that are functionally indistinguishable, but with some variation in features. This paper presents a model-based hardware acceleration of a structured and practical inference approach that is developed and validated to solve the inference problem in a mass spectrometry experiment of realistic size. Our approach starts from an examination of the known set of splice variants and isoforms of a target protein to identify the Greatest Common Stable Substring (GCSS) of amino acids and the Substrings Subjects to Limited Variation (SSLV) and their respective locations on the GCSS. The hypothesis made here is that these latter substrings (SSLV) appear inside complete peptides and not cutting across peptide boundaries. Then we define and solve the Sub-string Matching Problem with Limited Tolerance (SMPLT) using the Bit-Split Aho Corasick Algorithm with Limited Tolerance (BSACLT) that we define and automate. This approach is validated on identified peptides in a labelled and clustered data set from UNIPROT. A model-based hardware software co-design strategy is used to accelerate the computational workflow of above described protein inference problem. Identification of Baylisascaris Procyonis infection was used as an application instance. This workflow can be generalised to any inexact multiple pattern matching application by replacing the patterns in a clustered and distributed environment which permits a distance between member strings to account for permitted deviations such as substitutions, insertions and deletions. The co-designed workflow achieved up to 70 times maximum speed-up compared to a similar workflow purely run on the processor used for co-design.",
        "authors": [
            "Sugandima M. Vidanagamachchi",
            "S. Devapriya Dewasurendra",
            "Roshan G. Ragel",
            "Mahesan Niranjan"
        ],
        "author_info": [
            {
                "name": "Sugandima M. Vidanagamachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "S. Devapriya Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "Roshan G. Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Mahesan Niranjan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2014.7069624",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1412.7811",
        "pdf_url": "https://arxiv.org/pdf/1412.7811",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Proteins",
            "Peptides",
            "Hardware",
            "Amino acids",
            "Software",
            "Automata",
            "Databases"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2014.7069624/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2014.7069624/index.json",
        "submitted": "2022/06/27 03:37:40"
    },
    {
        "title": "Strategy to Design Formally Verified hardware/software implementation of Network Protocols on Reconfigurable Hardware",
        "venue": "2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2015",
        "abstract": "Kernel-based network protocol implementation has led to major performance limitations in high-performance networking owing to excessive transaction latencies. Designing such protocols in reconfigurable hardware such as FPGA has been attempted to overcome these limitations. The use of reconfigurable hardware is needed in the development phase and could eventually lead to ASICs for better performance. However, mission critical nature of such applications needs a performance guarantee on design. This paper proposes a strategy to design formally verified reconfigurable hardware/software based implementation of network protocols in a compositional manner.",
        "authors": [
            "Pabudi T Abeyrathne",
            "S.D. Dewasurendra",
            "Dhammika Elkaduwa"
        ],
        "author_info": [
            {
                "name": "Pabudi T Abeyrathne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "S.D. Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "Dhammika Elkaduwa",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2015.7398980",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.academia.edu/download/53590902/Abeyrathne.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "application specific integrated circuits",
            "computer networks",
            "field programmable gate arrays",
            "financial data processing",
            "hardware-software codesign",
            "protocols",
            "reconfigurable architectures"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2015.7398980/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2015.7398980/index.json",
        "submitted": "2022/06/27 03:40:07"
    },
    {
        "title": "Model-based fault diagnosis and prognosis of dynamic systems: a review",
        "venue": "Procedia Manufacturing",
        "year": "2019",
        "abstract": "In maintenance of engineering systems, condition monitoring, fault diagnosis and fault prognosis constitute some of the principal tasks. With the increase of the number of machines within processing plants and their operational complexities, many engineers and researchers have started looking for automated solutions for these tasks. In most of the proposed solutions, these dynamic systems are modelled using tools like automata, Petri nets, bond graphs and Bayesian networks to diagnose and predict faults in those systems. This paper reviews these graphical model-based techniques related to fault diagnosis and prognosis and give suggestions for future research directions identifying research gaps in the field.",
        "authors": [
            "Thushara Ekanayakea",
            "Devapriya Dewasurendra",
            "Sunil Abeyratne",
            "Lin Ma",
            "Prasad Yarlagadda"
        ],
        "author_info": [
            {
                "name": "Thushara Ekanayakea",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Devapriya Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "Sunil Abeyratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Lin Ma",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Prasad Yarlagadda",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1016/j.promfg.2019.02.060",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://doi.org/10.1016/j.promfg.2019.02.060",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "model-based systems",
            "fault diagnosis",
            "fault prognosis",
            "automata",
            "Petri nets",
            "bond graphs",
            "Bayesian networks"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1016/j.promfg.2019.02.060/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1016/j.promfg.2019.02.060/index.json",
        "submitted": "2022/06/27 03:43:39"
    },
    {
        "title": "Average time complexity analysis of Commentz-Walter algorithm",
        "venue": "Journal of the National Science Foundation of Sri Lanka",
        "year": "2018",
        "abstract": "",
        "authors": [
            "SD Dewasurendra",
            "SM Vidanagamachchi"
        ],
        "author_info": [
            {
                "name": "SD Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "SM Vidanagamachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "http://dx.doi.org/10.4038/jnsfsr.v46i4.8630",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "http://dx.doi.org/10.4038/jnsfsr.v46i4.8630",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/dx.10.4038/jnsfsr.v46i4.8630/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/dx.10.4038/jnsfsr.v46i4.8630/index.json",
        "submitted": "2022/06/27 03:49:11"
    },
    {
        "title": "Integrating runtime validation and hardware-in-the-loop (HiL) testing with V & V in complex hybrid systems",
        "venue": "Journal of the National Science Foundation of Sri Lanka",
        "year": "2019",
        "abstract": "",
        "authors": [
            "SD Dewasurendra",
            "AC Vidanapathirana",
            "SG Abeyratne"
        ],
        "author_info": [
            {
                "name": "SD Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "AC Vidanapathirana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "SG Abeyratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "http://dx.doi.org/10.4038/jnsfsr.v47i4.9678",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "http://dx.doi.org/10.4038/jnsfsr.v47i4.9678",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/dx.10.4038/jnsfsr.v47i4.9678/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/dx.10.4038/jnsfsr.v47i4.9678/index.json",
        "submitted": "2022/06/27 03:52:01"
    },
    {
        "title": "Offloading specific performance-related kernel functions into an FPGA",
        "venue": "2021 IEEE 30th International Symposium on Industrial Electronics (ISIE)",
        "year": "2021",
        "abstract": "Today's network transactions are usually handled using kernel-based network protocols residing on general-purpose processors (GPPs). Over time, network transmission speeds have developed rapidly without a corresponding increase in processing speeds of host processors. With devices featuring advanced connectivity and Internet functionality, protocol processing has created a heavy workload on the GPP and has become a limiting factor in high performance networking applications such as online High Frequency Trading Systems (HFTS). It encourages designers to increase processor performance or designing application specific processors for handling heavy network workloads. Then there is the choice of hardware/software implementations based on results from hardware acceleration. Offloading the whole network protocol stack implementation into hardware is not very attractive since handling large linked data structures inside the hardware is not as easy as in software. In this paper we claim that relieving the CPU from bulk processing by offloading selected, performance-related kernel code into hardware is a better option for such scenarios. Hence, we design a scalable system for offloading specific performance-related kernel functions into an FPGA. In this paper we discuss the logic behind our new architecture and the results up to now.",
        "authors": [
            "Pabudi T Abeyrathne",
            "S. Devapriya Dewasurendra",
            "Dhammika Elkaduwa"
        ],
        "author_info": [
            {
                "name": "Pabudi T Abeyrathne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "S. Devapriya Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            },
            {
                "name": "Dhammika Elkaduwa",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ISIE45552.2021.9576256",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.academia.edu/download/75534730/KF_003255_ISIE2021paper.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Performance evaluation",
            "Protocols",
            "Profitability",
            "Linux",
            "Computer architecture",
            "Software",
            "Security"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ISIE45552.2021.9576256/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ISIE45552.2021.9576256/index.json",
        "submitted": "2022/06/27 03:53:57"
    },
    {
        "title": "A Novel FPGA Architecture of Commentz-Walter Algorithm using Bit-Split String-Matching Engines",
        "venue": "2021 21st International Conference on Advances in ICT for Emerging Regions (ICter)",
        "year": "2021",
        "abstract": "This paper describes a reconfigurable hardware implementation of CommentzWalter algorithm with bit-split string matching engines to match multiple protein sequences. It is reported that multiple pattern matching using the most widely used Aho-Corasick algorithm for different applications has been carried out on graphics processing units and field programmable gate arrays to accelerate the matching process. Commentz-Walter algorithm, is a multiple pattern matching algorithm and more complex than Aho-Corasick. There are no reports of it being directly implemented in any hardware platform except as software implementations on general purpose processors. In this work, a specific architecture for our target application using CommentzWalter algorithm has been developed and tested with a simulator for hardware description languages. This architecture can match multiple patterns of proteins efficiently when implemented on a Field Programmable Gate Array. Finally, we compare a previously developed hardware architecture of bit-split Aho-Corasick with our bit-split Commentz-Walter architecture. Using the Intel Stratix IV GX EP4SGX230KF40C2 FPGA chip as the target device, the compilation results with Quartus II show that the synthesis logic utilization is 5% with 2203 total number of registers, 64896 FPGA block memory bits and 4 DSP block 18-bit elements. The simulation and practical experimental results show that the proposed architecture can effectively improve the performance of the Commentz-Walter algorithm.",
        "authors": [
            "Sugandima M. Vidanagamachchi",
            "Shirley D. Dewasurendra"
        ],
        "author_info": [
            {
                "name": "Sugandima M. Vidanagamachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Shirley D. Dewasurendra",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/",
                "type": "STAFF",
                "id": "dewasuren",
                "email": "dewasuren@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/shirley-dewasurendra.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/shirley-dewasurendra/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICter53630.2021.9774805",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Proteins",
            "Software algorithms",
            "Computer architecture",
            "Logic gates",
            "Hardware",
            "Software",
            "Registers"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICter53630.2021.9774805/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICter53630.2021.9774805/index.json",
        "submitted": "2022/06/27 03:55:31"
    },
    {
        "title": "Axis2UNO: Web Services Enabled Openoffice.org",
        "venue": "2008 4th International Conference on Information and Automation for Sustainability",
        "year": "2008",
        "abstract": "Openoffice.org is a popular, free and open source office product. This product is used by millions of people and developed, maintained and extended by thousands of developers worldwide. Playing a dominant role in the Web, Web services technology is serving millions of people every day. Axis2 is one of the most popular, free and open source Web service engines. The framework presented in this paper, Axis2UNO, a combination of such two technologies is capable of making a new era in office environment. Two other attempts to enhance Web services functionality in office products are Excel Web services and UNO Web service proxy. Excel Web services is combined with Microsoft SharePoint technology and exposes information sharing in a different perspective within the proprietary Microsoft office products. UNO Web service proxy is implemented with Java Web services developer pack and enables basic Web services related functionality in Openoffice.org. However, the work presented here is the first one to combine Openoffice.org and Axis2 and we expect it to outperform the other efforts with the community involvement and feature richness in those products.",
        "authors": [
            "BANM Bambarasinghe",
            "HMS Huruggamuwa",
            "Roshan G Ragel",
            "Swarnalatha Radhakrishnan"
        ],
        "author_info": [
            {
                "name": "BANM Bambarasinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "HMS Huruggamuwa",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2008.4783956",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/ftp/arxiv/papers/1402/1402.0670.pdf",
        "pdf_url": "https://arxiv.org/ftp/arxiv/papers/1402/1402.0670.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Web services",
            "Search engines",
            "Computer networks",
            "Maintenance engineering",
            "Java",
            "Data security",
            "Packaging",
            "Office automation",
            "Information technology",
            "Resource management"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2008.4783956/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2008.4783956/index.json",
        "submitted": "2022/07/04 12:00:16"
    },
    {
        "title": "Loop unrolling in multi-pipeline ASIP design",
        "venue": "2009 International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2009",
        "abstract": "Application Specific Instruction-set Processor (ASIP) is one of the popular processor design techniques for embedded systems which allow customizability in processor design without overly hindering design flexibility. Multi-pipeline ASIPs were proposed to improve the performance of such systems by compromising between speed and processor area. One of the problems in the multi-pipeline design is the limited inherent instruction level parallelism (ILP) available in applications. The ILP of application programs can be improved via a compiler optimization technique known as loop unrolling. In this paper, we present the impact of loop unrolling on the performance (speed) of multi-pipeline ASIPs. The improvement in speed averages around 15% for a number of benchmark applications with the maximum improvement of around 30%. In addition, we report the variation of performance against the loop unrolling factor - the amount of unrolling performed on an application.",
        "authors": [
            "HMRDB Navarathna",
            "Swarnalatha Radhakrishnan",
            "Roshan G Ragel"
        ],
        "author_info": [
            {
                "name": "HMRDB Navarathna",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2009.5429845",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1402.0671",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Application specific processors",
            "Authentication",
            "Computer science",
            "Steganography",
            "Image analysis",
            "Algorithm design and analysis",
            "Computer industry",
            "Information systems",
            "Postal services",
            "Entropy"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2009.5429845/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2009.5429845/index.json",
        "submitted": "2022/07/04 12:03:04"
    },
    {
        "title": "Heterogeneous processor pipeline for a product cipher application",
        "venue": "2011 6th International Conference on Industrial and Information Systems",
        "year": "2011",
        "abstract": "Processing data received as a stream is a task commonly performed by modern embedded devices, in a wide range of applications such as multimedia (encoding/decoding/ playing media), networking (switching and routing), digital security, scientific data processing, etc. Such processing normally tends to be calculation intensive and therefore requiring significant processing power. Therefore, hardware acceleration methods to increase the performance of such applications constitute an important area of study. In this paper, we present an evaluation of one such method to process streaming data, namely multi-processor pipeline architecture. The hardware is based on a Multiple-Processor System on Chip (MPSoC), using a data encryption algorithm as a case study. The algorithm is partitioned on a coarse grained level and mapped on to an MPSoC with five processor cores in a pipeline, using specifically configured Xtensa LX3 cores. The system is then selectively optimized by strengthening and pruning the resources of each processor core. The optimized system is evaluated and compared against an optimal single-processor System on Chip (SoC) for the same application. The multiple-processor pipeline system for data encryption algorithms used was observed to provide significant speed ups, up to 4.45 times that of the single-processor system, which is close to the ideal speed up from a five-stage pipeline.",
        "authors": [
            "Isuru B. Nawinne",
            "Mahanama S. Wickramasinghe",
            "Roshan G. Ragel",
            "Swarnalatha Radhakrishnan"
        ],
        "author_info": [
            {
                "name": "Isuru B. Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            },
            {
                "name": "Mahanama S. Wickramasinghe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/mahanama-wickramasinghe/",
                "type": "STAFF",
                "id": "mahanamaw",
                "email": "mahanamaw@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/mahanama-wickramasinghe.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/mahanama-wickramasinghe/"
            },
            {
                "name": "Roshan G. Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2011.6038036",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/ftp/arxiv/papers/1403/1403.7299.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Pipelines",
            "Encryption",
            "Algorithm design and analysis",
            "Partitioning algorithms",
            "Streaming media",
            "Computer architecture"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2011.6038036/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2011.6038036/index.json",
        "submitted": "2022/07/04 12:06:06"
    },
    {
        "title": "Instruction-set selection for multi-application based ASIP design: An instruction-level study",
        "venue": "2012 IEEE 6th International Conference on Information and Automation for Sustainability",
        "year": "2012",
        "abstract": "Efficiency in embedded systems is paramount to achieve high performance while consuming less area and power. Processors in embedded systems have to be designed carefully to achieve such design constraints. Application Specific Instruction set Processors (ASIPs) exploit the nature of applications to design an optimal instruction set. Despite being not general to execute any application, ASIPs are highly preferred in the embedded systems industry where the devices are produced to satisfy a certain type of application domain/s (either intra-domain or inter-domain). Typically, ASIPs are designed from a base-processor and functionalities are added for applications. This paper studies the multi-application ASIPs and their instruction sets, extensively analysing the instructions for inter-domain and intra-domain designs. Metrics analysed are the reusable instructions and the extra cost to add a certain application. A wide range of applications from various application benchmarks (MiBench, MediaBench and SPEC2006) and domains are analysed for two different architectures (ARM-Thumb and PISA). Our study shows that the intra-domain applications contain larger number of common instructions, whereas the inter-domain applications have very less common instructions, regardless of the architecture (and therefore the ISA).",
        "authors": [
            "Roshan Ragel",
            "Swarnalatha Radhakrishnan",
            "Angelo Ambrose"
        ],
        "author_info": [
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Angelo Ambrose",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2012.6419895",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1403.7291.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "GSM",
            "Engines",
            "Integrated circuits",
            "Transform coding"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2012.6419895/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2012.6419895/index.json",
        "submitted": "2022/07/04 12:08:28"
    },
    {
        "title": "DIMSim: A rapid two-level cache simulation approach for deadline-based MPSoCs",
        "venue": "8th IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis",
        "year": "2012",
        "abstract": "It is of critical importance to satisfy deadline requirements for an embedded application to avoid undesired outcomes. Multiprocessor System-on-Chips (MPSoCs) play a vital role in contemporary embedded devices to satisfy timing deadlines. Such MPSoCs include two-level cache hierarchies which have to be dimensioned carefully to support timing deadlines of the application(s) while consuming minimum area and therefore minimum power. Given the deadline of an application, it is possible to systematically derive the maximum time that could be spent on memory accesses which can then be used to dimension the suitable cache sizes. As the dimensioning has to be done rapidly to satisfy the time to market requirement, we choose a well acclaimed rapid cache simulation strategy, the single-pass trace driven simulation, for estimating the cache dimensions. Therefore, for the first time, we address the two main challenges, coherency and scalability, in adapting a single-pass simulator to a MPSoC with two-level cache hierarchy. The challenges are addressed through a modular bottom-up simulation technique where L1 and L2 simulations are handled in independent communicating modules. In this paper, we present how the dimensioning is performed for a two-level inclusive data cache hierarchy in an MPSoC. With the rapid simulation proposed, the estimations are suggested within an hour (worst case on considered application benchmarks). We experimented our approach with task based MPSoC implementations of JPEG and H264 benchmarks and achieved timing deviations of 16.1% and 7.2% respectively on average against the requested data access times. The deviation numbers are always positive meaning our simulator guarantees to satisfy the requested data access time. In addition, we generated a set of synthetic memory traces and used them to extensively analyse our simulator. For the synthetic traces, our simulator provides cache sizes to always guarantee the requested data access time, deviating below 14.5% on average.",
        "authors": [
            "Mohammad Shihabul Haque",
            "Roshan Ragel",
            "Angelo Ambrose",
            "Swarnalatha Radhakrishnan",
            "Sri Parameswaran"
        ],
        "author_info": [
            {
                "name": "Mohammad Shihabul Haque",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Angelo Ambrose",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1145/2380445.2380473",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Hardware",
            "Hardware validation"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1145/2380445.2380473/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1145/2380445.2380473/index.json",
        "submitted": "2022/07/04 12:11:27"
    },
    {
        "title": "A Study on Instruction-set Selection Using Multi-application Based Application Specific Instruction-set Processors",
        "venue": "2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems",
        "year": "2013",
        "abstract": "Efficiency in embedded systems is paramount to achieve high performance while consuming less area and power. Processors in embedded systems have to be designed carefully to achieve such design constraints. Application Specific Instruction set Processors (ASIPs) exploit the nature of applications to design an optimal instruction set. Despite being not general to execute any application, ASIPs are highly preferred in the embedded systems industry where the devices are produced to satisfy a certain type of application domain/s (either intra-domain or inter-domain). Typically, ASIPs are designed from a base-processor and functionalities are added for applications. This paper studies the multi-application ASIPs and their instruction sets, extensively analyzing the instructions for inter-domain and intra-domain designs. Metrics analyzed are the reusable instructions and the extra cost to add a certain application, together with the hardware synthesis numbers, such as area, timing and delay. A wide range of applications from various application benchmarks (BioPerf, CommBench, MediaBench, MiBench and SPEC2006) and domains are analyzed for three different architectures (LEON2, PISA and ARM-Thumb). Processors are generated for these architectures for different configurations to analyze and synthesize. Our study shows that the intra-domain applications contain larger number of common instructions, whereas the inter-domain applications have very less common instructions, regardless the kind of architecture (and therefore the ISA).",
        "authors": [
            "Roshan G. Ragel",
            "Swarnalatha Radhakrishnan",
            "Jude Angelo Ambrose",
            "Sri Parameswaran"
        ],
        "author_info": [
            {
                "name": "Roshan G. Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Jude Angelo Ambrose",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/VLSID.2013.154",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/profile/Roshan-Ragel/publication/261501995_A_Study_on_Instruction-set_Selection_Using_Multi-application_Based_Application_Specific_Instruction-set_Processors/links/54e48faf0cf2dbf60696e9b4/A-Study-on-Instruction-set-Selection-Using-Multi-application-Based-Application-Specific-Instruction-set-Processors.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Hardware",
            "Thumb",
            "Embedded systems",
            "Benchmark testing",
            "Standards",
            "Instruction sets"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/VLSID.2013.154/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/VLSID.2013.154/index.json",
        "submitted": "2022/07/23 21:41:28"
    },
    {
        "title": "CSER: HW/SW configurable soft-error resiliency for application specific instruction-set processors",
        "venue": "2013 Design, Automation & Test in Europe Conference & Exhibition (DATE)",
        "year": "2013",
        "abstract": "Soft error has been identified as one of the major challenges to CMOS technology based computing systems. To mitigate this problem, error recovery is a key component, which usually accounts for a substantial cost, since they must introduce redundancies in either time or space. Consequently, using state-of-art recovery techniques could heavily worsen the design constraint, which is fairly stringent for embedded system design. In this paper, we propose a HW/SW methodology that generates the processor, which performs finely configured error recovery functionality targeting the given design constraints (e.g., performance, area and power). Our methodology employs three application-specific optimization heuristics, which generate the optimized composition and configuration based on the two primitive error recovery techniques. The resultant processor is composed of selected primitive techniques at corresponding instruction execution, and configured to perform error recovery at run-time accordingly to the scheme determined at design time. The experiment results have shown that our methodology can at best achieve nine times reliability while maintaining the given constraints, in comparison to the state of the art.",
        "authors": [
            "Tuo Li",
            "Muhammad Shafique",
            "Semeen Rehman",
            "Swarnalatha Radhakrishnan",
            "Roshan Ragel",
            "Jude Angelo Ambrose",
            "J\u00c3\u00b6rg Henkel",
            "Sri Parameswaran"
        ],
        "author_info": [
            {
                "name": "Tuo Li",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Muhammad Shafique",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Semeen Rehman",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Jude Angelo Ambrose",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "J\u00c3\u00b6rg Henkel",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.7873/DATE.2013.152",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Redundancy",
            "Time factors",
            "Runtime",
            "Integrated circuits",
            "Programming"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.7873/DATE.2013.152/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.7873/DATE.2013.152/index.json",
        "submitted": "2022/07/23 21:43:51"
    },
    {
        "title": "DRMA: dynamically reconfigurable MPSoC architecture",
        "venue": "GLSVLSI '13: Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI",
        "year": "2013",
        "abstract": "Embedded systems are ubiquitous and are deployed in a large range of applications. Designing and fabricating Integrated Circuits (ICs) targeting such different range of applications is expensive. Designers seek flexible processors which efficiently execute a multitude of applications. FPGAs are considered affordable, but design cost, high reconfiguration delay and power consumption are all prohibitive. In this paper, we propose a novel ASIC based flexible MPSoC architecture, which can execute separate tasks in parallel, and it can be configured to execute single task with wide data widths or execute multiple tasks with varying data widths. The architecture presented, called Dynamically Reconfigurable MPSoC Architecture (DRMA), can be rapidly reconfigured through instructions. We present applications as case studies to showcase the flexibility and efficacy of DRMA. Results show for an additional area overhead of about 5%, the system is capable of working as four 32-bit processors, a single 128 bit processor or as a pipelined processing system.",
        "authors": [
            "Lawrance Zhang",
            "Jude Angelo Ambrose",
            "Jorgen Peddersen",
            "Sri Parameswaran",
            "Roshan Ragel",
            "Swarnalatha Radhakrishnan",
            "Kewal K. Saluja"
        ],
        "author_info": [
            {
                "name": "Lawrance Zhang",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Jude Angelo Ambrose",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Jorgen Peddersen",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Kewal K. Saluja",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1145/2483028.2483101",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Computer systems organization",
            "Architectures",
            "Serial architectures",
            "Pipeline computing",
            "Hardware"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1145/2483028.2483101/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1145/2483028.2483101/index.json",
        "submitted": "2022/07/23 21:48:42"
    },
    {
        "title": "Exploring multilevel cache hierarchies in application specific mpsocs",
        "venue": "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems",
        "year": "2015",
        "abstract": "Multiprocessor systems make use of multilevel cache hierarchies to improve overall memory access speed. Embedded systems typically use configurable processors, where the caches in the system can be customized for a given application or a set of applications. Finding the optimal or a near-optimal set size, block size, and associativity of each of the caches in a multilevel cache hierarchy is a challenging task due to the presence of billions or even trillions of design points. This paper presents an iterative exploration method to find suitable configurations for all the caches in the hierarchy of an application specific multiprocessor system-on-chip, to improve memory access speed. We propose an algorithm and combine it with the use of specialized hardware for parallel cache simulation to enable multiple back-and-forth iterations through the cache levels. In every iteration, our algorithm explores selected portions of the entire design space to quickly converge upon the final design point. We demonstrate our methodology on two- and three-level cache hierarchies with private and shared caches in a quad-core system, respectively, consisting of 5.4 billion and 10.4 trillion design points. Our method was able to find design points with up to 18.9% lower average memory access time while reducing total cache size by up to 74.15%, compared to a state-of-the-art noniterative method. The number of design points explored was 4\u00c3\u0097 higher in our method, which is still a mere 3.6 \u00c3\u0097 10 -5 % of the entire design space, and took 6.08 h.",
        "authors": [
            "Isuru Nawinne",
            "Haris Javaid",
            "Roshan Ragel",
            "Swarnalatha Radhakrishnan",
            "Sri Parameswaran"
        ],
        "author_info": [
            {
                "name": "Isuru Nawinne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Haris Javaid",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/TCAD.2015.2445736",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Algorithm design and analysis",
            "Hardware",
            "Program processors",
            "Space exploration",
            "Integrated circuit modeling",
            "Mathematical model",
            "Optimization"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/TCAD.2015.2445736/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/TCAD.2015.2445736/index.json",
        "submitted": "2022/07/23 21:53:05"
    },
    {
        "title": "Exploring multilevel cache hierarchies in application specific mpsocs",
        "venue": "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems",
        "year": "2015",
        "abstract": "Multiprocessor systems make use of multilevel cache hierarchies to improve overall memory access speed. Embedded systems typically use configurable processors, where the caches in the system can be customized for a given application or a set of applications. Finding the optimal or a near-optimal set size, block size, and associativity of each of the caches in a multilevel cache hierarchy is a challenging task due to the presence of billions or even trillions of design points. This paper presents an iterative exploration method to find suitable configurations for all the caches in the hierarchy of an application specific multiprocessor system-on-chip, to improve memory access speed. We propose an algorithm and combine it with the use of specialized hardware for parallel cache simulation to enable multiple back-and-forth iterations through the cache levels. In every iteration, our algorithm explores selected portions of the entire design space to quickly converge upon the final design point. We demonstrate our methodology on two- and three-level cache hierarchies with private and shared caches in a quad-core system, respectively, consisting of 5.4 billion and 10.4 trillion design points. Our method was able to find design points with up to 18.9% lower average memory access time while reducing total cache size by up to 74.15%, compared to a state-of-the-art noniterative method. The number of design points explored was 4\u00c3\u0097 higher in our method, which is still a mere 3.6 \u00c3\u0097 10 -5 % of the entire design space, and took 6.08 h.",
        "authors": [
            "Isuru Nawinne",
            "Haris Javaid",
            "Roshan Ragel",
            "Swarnalatha Radhakrishnan",
            "Sri Parameswaran"
        ],
        "author_info": [
            {
                "name": "Isuru Nawinne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Haris Javaid",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Swarnalatha Radhakrishnan",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/",
                "type": "STAFF",
                "id": "swarnar",
                "email": "swarnar@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/swarnalatha-radhakrishnan.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/swarnalatha-radhakrishnan/"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/TCAD.2015.2445736",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Algorithm design and analysis",
            "Hardware",
            "Program processors",
            "Space exploration",
            "Integrated circuit modeling",
            "Mathematical model",
            "Optimization"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/TCAD.2015.2445736/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/TCAD.2015.2445736/index.json",
        "submitted": "2022/07/23 21:55:24"
    },
    {
        "title": "Affordable real-time environment monitoring system for greenhouses",
        "venue": "2016 Manufacturing & Industrial Engineering Symposium (MIES)",
        "year": "2016",
        "abstract": "Greenhouse has been the best alternative solution to get a better crop production compared to the traditional agricultural industry. Greenhouses are used to increase harvest by controlling key factors which will aect the planet growth. Real-time monitoring of the greenhouse environment and taking necessary control decisions will result in improvement of yields and economic performance. In this Research paper, we propose an environmental monitoring and controlling system that have the ability to collect the information related to greenhouse environment using various sensors. This system provides the ability to monitor and control the greenhouse remotely via a web interface and a mobile application. Using a low-cost wireless sensor network, environment data on greenhouse are sent to the centralized server. It will store all this data and show the latest environment details of the greenhouse using the web interface. The web interface will provide a real-time graphical display of data using charts and gauges and ability to send control decisions to the central node which is necessary to increase harvest and improve the quality of crops.",
        "authors": [
            "Supun Athukorala",
            "Irunika Weeraratne",
            "Dumindu Jayathilaka",
            "Asitha Bandaranayake",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Supun Athukorala",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Irunika Weeraratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Dumindu Jayathilaka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Asitha Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/MIES.2016.7780261",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Servers",
            "Greenhouses",
            "Sensor systems",
            "Relays",
            "Monitoring",
            "Sensor phenomena and characterization"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MIES.2016.7780261/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MIES.2016.7780261/index.json",
        "submitted": "2022/07/24 03:09:57"
    },
    {
        "title": "Identifying the optimal set of attributes that impose high impact on the end results of a cricket match using machine learning",
        "venue": "2017 IEEE International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2017",
        "abstract": "Indian Premier League (IPL) is a franchise system based, annual cricket tournament. IPL deals with millions of dollars. The amount of money spent on the IPL teams imposes high pressure on owners to search victories, which depends on team performance. Essentially, it is critical to find the right set of metrics that would lead to assemble a team with the highest chance of winning. This study attempts to identify the optimal set of attributes, which impose the high impact on the results of a cricket match. Determining an optimal set of attributes will help team owners to look for players with these attributes to form a team by which they can enhance the winnability of a cricket team. Several efforts have already been taken to address this problem without much success. Most of the existing works focused on identifying different performance metrics based on their domain knowledge of cricket. The proposed solution relies on statistical analysis and machine learning while minimizing the use of domain knowledge. Ball by ball data for all past IPL matches were collected, aggregated to innings level details for the analysis and the problem is modeled as a classification problem. The data set contained a set of features based on the innings level data and win/lose/draw class labels. Different machine learning algorithms were employed, and Support Vector Machine (SVM) achieved the best accuracy in the evaluation. Then, we examined all possible feature combinations using SVM by using separate training and testing sets. Finally, the attribute set that yields the highest accuracy in the evaluation is identified, which will be the optimal set of attributes that impose the high impact on the end results of a cricket match.",
        "authors": [
            "Pranavan Somaskandhan",
            "Gihan Wijesinghe",
            "Leshan Bashitha Wijegunawardana",
            "Asitha Bandaranayake",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "Pranavan Somaskandhan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Gihan Wijesinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Leshan Bashitha Wijegunawardana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Asitha Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2017.8300399",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Sports equipment",
            "Data mining",
            "Measurement",
            "Support vector machines",
            "Statistical analysis",
            "Games",
            "Relational databases"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2017.8300399/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2017.8300399/index.json",
        "submitted": "2022/07/24 03:12:25"
    },
    {
        "title": "Visual Design Platform for Wireless Sensor Network",
        "venue": "2018 Moratuwa Engineering Research Conference (MERCon)",
        "year": "2018",
        "abstract": "Wireless Sensor Networks (WSN) are being widely used for sensing physical parameters in a broad geographical area. The person who needs WSN will have a pictorial idea of the sensor network. The problem in the traditional method is that the person who needs the WSN should explain the pictorial view of the sensor network to a commercial vendor and buy it from them or they should design it from the scratch. What we proposed in our solution is to develop a platform so that the person who needs the WSN can directly draw the pictorial view on a canvas and then it can automatically generate all the required firmware for the microcontrollers and wiring diagrams. The user is then required only to follow a few instructions to complete the real world implementation of WSNs. This paper is about developing a visual platform to design WSNs. The WSN designing platform was built as a web application, so it can manage a large number of supported sensors and microcontrollers. This means that if one user adds the device driver for any sensor or a microcontroller the other users can directly use it from the WSN design platform without worrying about hardware programming. Further, if anyone needs a new sensor or microcontroller to be supported by this visual design platform, this design tool will have interfaces to directly add new sensors and microcontrollers. The proposed method is affordable for developing custom wireless sensor networks.",
        "authors": [
            "Rosen Silva",
            "Asela Dasanayaka",
            "Roshan Ragel",
            "Asitha Bandaranayake"
        ],
        "author_info": [
            {
                "name": "Rosen Silva",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Asela Dasanayaka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Asitha Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon.2018.8421896",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/profile/Asitha-Bandaranayake-3/publication/327517623_Visual_Design_Platform_for_Wireless_Sensor_Network/links/5f98da03458515b7cfa4013c/Visual-Design-Platform-for-Wireless-Sensor-Network.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Wireless sensor networks",
            "Microcontrollers",
            "Databases",
            "Skeleton",
            "Visualization",
            "Hardware",
            "Programming"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon.2018.8421896/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon.2018.8421896/index.json",
        "submitted": "2022/07/24 03:14:34"
    },
    {
        "title": "Raw transcriptomics data to gene specific SSRs: a validated free bioinformatics workflow for biologists",
        "venue": "Nature Scientific Reports",
        "year": "2020",
        "abstract": "Recent advances in next-generation sequencing technologies have paved the path for a considerable amount of sequencing data at a relatively low cost. This has revolutionized the genomics and transcriptomics studies. However, different challenges are now created in handling such data with available bioinformatics platforms both in assembly and downstream analysis performed in order to infer correct biological meaning. Though there are a handful of commercial software and tools for some of the procedures, cost of such tools has made them prohibitive for most research laboratories. While individual open-source or free software tools are available for most of the bioinformatics applications, those components usually operate standalone and are not combined for a user-friendly workflow. Therefore, beginners in bioinformatics might find analysis procedures starting from raw sequence data too complicated and time-consuming with the associated learning-curve. Here, we outline a procedure for de novo transcriptome assembly and Simple Sequence Repeats (SSR) primer design solely based on tools that are available online for free use. For validation of the developed workflow, we used Illumina HiSeq reads of different tissue samples of Santalum album (sandalwood), generated from a previous transcriptomics project. A portion of the designed primers were tested in the lab with relevant samples and all of them successfully amplified the targeted regions. The presented bioinformatics workflow can accurately assemble quality transcriptomes and develop gene specific SSRs. Beginner biologists and researchers in bioinformatics can easily utilize this workflow for research purposes.",
        "authors": [
            "DNU Naranpanawa",
            "CHWMRB Chandrasekara",
            "PCG Bandaranayake",
            "AU Bandaranayake"
        ],
        "author_info": [
            {
                "name": "DNU Naranpanawa",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "CHWMRB Chandrasekara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "PCG Bandaranayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "AU Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            }
        ],
        "doi": "https://doi.org/10.1038/s41598-020-75270-8",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.nature.com/articles/s41598-020-75270-8.pdf",
        "pdf_url": "https://www.nature.com/articles/s41598-020-75270-8.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1038/s41598-020-75270-8/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1038/s41598-020-75270-8/index.json",
        "submitted": "2022/07/24 03:17:31"
    },
    {
        "title": "Data Mining System for Predicting a Winning Cricket Team",
        "venue": "2021 IEEE 16th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2021",
        "abstract": "Cricket is a two-team outdoor game that originated in England around the 19th century. This is played in 3 forms as twenty20, ODI, and Test matches. Due to the availability of data, researchers have been able to do statistical analysis of data for pattern recognition, to find factors affecting the game, and for outcome prediction. But due to the high uncertainty of the game, it has become very difficult to come up with a stable and accurate model. The outcome model also depends on the number of overs, match type, time period, and player combination among many other factors. This research focuses only on the ODI matches that were played between ICC full members; Australia, West Indies, Sri Lanka, Bangladesh, New Zealand, Ireland, India, Zimbabwe, Afghanistan, England, South Africa, and Pakistan. This outcome prediction is based on players\u00e2\u0080\u0099 performances in a team and some features specific to the team and the match. The individual performance of batsmen, bowlers, and fielders are analyzed separately considering all-time ODI data. The combined performance of batsmen and bowlers was analyzed, and compared with individual performances using statistical methods. Association rule mining was used to find frequent winning player combinations. Match data from 2015 to 2020 were considered for the combined performance analysis and outcome prediction. For all these predictions we used data mining and machine learning techniques.",
        "authors": [
            "Dinithi Hasanika",
            "Roshani Dilhara",
            "Dulanjali Liyanage",
            "Asitha Bandaranayake",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "Dinithi Hasanika",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshani Dilhara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Dulanjali Liyanage",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Asitha Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIIS53135.2021.9660702",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Uncertainty",
            "Statistical analysis",
            "Conferences",
            "Games",
            "Machine learning",
            "Data mining",
            "Australia"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIIS53135.2021.9660702/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIIS53135.2021.9660702/index.json",
        "submitted": "2022/07/24 03:18:57"
    },
    {
        "title": "Using microkernel based virtualization for Byzantine fault tolerance",
        "venue": "2011 6th International Conference on Industrial and Information Systems",
        "year": "2011",
        "abstract": "A Byzantine fault is a failure that cannot be identified by observing the output of a component; the component produces a wrong result as opposed to not producing a result at all or producing a result that can be identified as wrong. Such faults may be caused by a number of causes including software bugs and malicious attacks. Tolerating such faults is essential for a critical system. Isolated replication and majority voting is a well established technique to tolerate Byzantine faults. Current implementations of such systems either uses replicated hardware or software virtualization-using virtual machine monitors-to get the illusion of hardware replication to tolerate Byzantine faults. In this paper, we investigate the possibility of using microkernel technology to achieve the isolated replication and discuss the features of a microkernel API suitable for such a deployment. The advantage of our approach is that it reduces the cost of additional hardware or avoid the complexity of virtualization required to mimic hardware replication. We used a single machine, running the L4 microkernel to provide the isolation required for the replicas. All replicas run in parallel and majority voting is performed to obtain the correct result in the presence of Byzantine faults. We selected the AES encryption algorithms for our case study and faults were deliberately injected to replicas to mimic Byzantine behavior. Our experiments show that it is feasible to use microkernels technology for this purpose.",
        "authors": [
            "Asanka Senevirathna",
            "Bhathiya Wasala",
            "Buddhika Ranaweera",
            "Dhammika Elkaduwe"
        ],
        "author_info": [
            {
                "name": "Asanka Senevirathna",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Bhathiya Wasala",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Buddhika Ranaweera",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Dhammika Elkaduwe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2011.6038037",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Hardware",
            "Kernel",
            "Computer bugs",
            "Information systems",
            "USA Councils",
            "Fault tolerant systems"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2011.6038037/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2011.6038037/index.json",
        "submitted": "2022/07/25 21:42:06"
    },
    {
        "title": "Constant time encryption as a countermeasure against remote cache timing attacks",
        "venue": "2012 IEEE 6th International Conference on Information and Automation for Sustainability",
        "year": "2012",
        "abstract": "Rijndael was standardized in 2001 by National Institute of Standard and Technology as the Advanced Encryption Standard (AES). AES is still being used to encrypt financial, military and even government confidential data. In 2005, Bernstein illustrated a remote cache timing attack on AES using the client-server architecture and therefore proved a side channel in its software implementation. Over the years, a number of countermeasures have been proposed against cache timing attacks both using hardware and software. Although the software based countermeasures are flexible and easy to deploy, most of such countermeasures are vulnerable to statistical analysis. In this paper, we propose a novel software based countermeasure against cache timing attacks, known as constant time encryption, which we believe is secure against statistical analysis. The countermeasure we proposed performs rescheduling of instructions such that the encryption rounds will consume constant time independent of the cache hits and misses. Through experiments, we prove that our countermeasure is secure against Bernstein's cache timing attack.",
        "authors": [
            "Darshana Jayasinghe",
            "Roshan Ragel",
            "Dhammika Elkaduwe"
        ],
        "author_info": [
            {
                "name": "Darshana Jayasinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Dhammika Elkaduwe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2012.6419893",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/ftp/arxiv/papers/1403/1403.7293.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Encryption",
            "Timing",
            "Software",
            "Hardware",
            "Clocks",
            "Computers"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2012.6419893/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2012.6419893/index.json",
        "submitted": "2022/07/25 21:44:29"
    },
    {
        "title": "To use or not to use: Graphics processing units (GPUs) for pattern matching algorithms",
        "venue": "7th International Conference on Information and Automation for Sustainability",
        "year": "2014",
        "abstract": "String matching is an important part in today's computer applications and Aho-Corasick algorithm is one of the main string matching algorithms used to accomplish this. This paper discusses that when can the GPUs be used for string matching applications using the Aho-Corasick algorithm as a benchmark We have to identify the best unit to run our string matching algorithm according to the performance of our devices and the applications. Sometimes CPU gives better performance than GPU and sometimes GPU gives better performance than CPU. Therefore, identifying this critical point is significant task for researchers who are using GPUs to improve the performance of their string matching applications based on string matching algorithms.",
        "authors": [
            "DRVLB Thambawita",
            "Roshan Ragel",
            "Dhammika Elkaduwe"
        ],
        "author_info": [
            {
                "name": "DRVLB Thambawita",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Dhammika Elkaduwe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2014.7069585",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/profile/Roshan-Ragel/publication/270222593_To_Use_or_Not_to_Use_Graphics_Processing_Units_for_Pattern_Matching_Algorithms/links/54e48fc30cf2dbf60696ea10/To-Use-or-Not-to-Use-Graphics-Processing-Units-for-Pattern-Matching-Algorithms.pdf",
        "pdf_url": "https://ieeexplore.ieee.org/abstract/document/7069585",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Graphics processing units",
            "Central Processing Unit",
            "Pattern matching",
            "Parallel processing",
            "Algorithm design and analysis",
            "Performance evaluation",
            "Software algorithms"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2014.7069585/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2014.7069585/index.json",
        "submitted": "2022/07/25 21:48:20"
    },
    {
        "title": "An optimized Parallel Failure-less Aho-Corasick algorithm for DNA sequence matching",
        "venue": "2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2016",
        "abstract": "The Aho-Corasick algorithm is a multiple patterns searching algorithm running sequentially in various applications like network intrusion detection and bioinformatics for finding several input strings within a given large input string. The parallel version of the Aho-Corasick algorithm is called as Parallel Failure-less Aho-Corasick algorithm because it doesnt need failure links like in the original Aho-Corasick algorithm. In this research, we implemented an application specific parallel failureless Aho-Corasick algorithm on the general purpose graphic processing unit by applying several cache optimization techniques for matching DNA sequences. Our parallel Aho-Corasick algorithm shows better performance than the available parallel Aho-Corasick algorithm library due to its simplicity and optimized cache memory usage of graphic processing units for matching DNA sequences.",
        "authors": [
            "DRVLB Thambawita",
            "Roshan G Ragel",
            "Dhammike Elkaduwe"
        ],
        "author_info": [
            {
                "name": "DRVLB Thambawita",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Dhammike Elkaduwe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2016.7946533",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1811.10498",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Pattern matching",
            "DNA",
            "Algorithm design and analysis",
            "Kernel",
            "Bioinformatics",
            "Intrusion detection",
            "Graphics processing units"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2016.7946533/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2016.7946533/index.json",
        "submitted": "2022/07/25 21:53:49"
    },
    {
        "title": "An optimized Parallel Failure-less Aho-Corasick algorithm for DNA sequence matching",
        "venue": "2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2016",
        "abstract": "The Aho-Corasick algorithm is a multiple patterns searching algorithm running sequentially in various applications like network intrusion detection and bioinformatics for finding several input strings within a given large input string. The parallel version of the Aho-Corasick algorithm is called as Parallel Failure-less Aho-Corasick algorithm because it doesnt need failure links like in the original Aho-Corasick algorithm. In this research, we implemented an application specific parallel failureless Aho-Corasick algorithm on the general purpose graphic processing unit by applying several cache optimization techniques for matching DNA sequences. Our parallel Aho-Corasick algorithm shows better performance than the available parallel Aho-Corasick algorithm library due to its simplicity and optimized cache memory usage of graphic processing units for matching DNA sequences.",
        "authors": [
            "DRVLB Thambawita",
            "Roshan G Ragel",
            "Dhammike Elkaduwe"
        ],
        "author_info": [
            {
                "name": "DRVLB Thambawita",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Dhammike Elkaduwe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2016.7946533",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1811.10498.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Pattern matching",
            "DNA",
            "Algorithm design and analysis",
            "Kernel",
            "Bioinformatics",
            "Intrusion detection",
            "Graphics processing units"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2016.7946533/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2016.7946533/index.json",
        "submitted": "2022/07/25 21:55:47"
    },
    {
        "title": "To use or not to use: CPUs' cache optimization techniques on GPGPUs",
        "venue": "2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2016",
        "abstract": "General Purpose Graphic Processing Unit(GPGPU) is used widely for achieving high performance or high throughput in parallel programming. This capability of GPGPUs is very famous in the new era and mostly used for scientific computing which requires more processing power than normal personal computers. Therefore, most of the programmers, researchers and industry use this new concept for their work. However, achieving high-performance or high-throughput using GPGPUs are not an easy task compared with conventional programming concepts in the CPU side. In this research, the CPUs cache memory optimization techniques have been adopted to the GPGPUs cache memory to identify rare performance improvement techniques compared to GPGPU's best practices. The cache optimization techniques of blocking, loop fusion, array merging and array transpose were tested on GPGPUs for finding suitability of these techniques. Finally, we identified that some of the CPU cache optimization techniques go well with the cache memory system of the GPGPU and shows performance improvements while some others show the opposite effect on the GPGPUs compared with the CPUs.",
        "authors": [
            "DRVLB Thambawita",
            "Roshan G Ragel",
            "Dhammike Elkaduwe"
        ],
        "author_info": [
            {
                "name": "DRVLB Thambawita",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Dhammike Elkaduwe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/",
                "type": "STAFF",
                "id": "dhammika",
                "email": "dhammika@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/dhammika-elkaduwe.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/dhammika-elkaduwe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2016.7946534",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1810.04063",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Arrays",
            "Optimization",
            "Merging",
            "Cache memory",
            "Testing",
            "Kernel",
            "Throughput"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2016.7946534/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2016.7946534/index.json",
        "submitted": "2022/07/25 21:57:24"
    },
    {
        "title": "Novel Way of Using Mobile Phone for an Outside Science Learning Activity",
        "venue": "Literacy Information and Computer Education Journal (LICEJ)",
        "year": "2015",
        "abstract": "Present-day mobile phones combine the capabilities of communication devices, cameras and computers. Even though their educational values are well established, their widespread use is hindered by the general fears about students\u00e2\u0080\u0099 misuse of mobile phones and other barriers such as their operating cost and teachers\u00e2\u0080\u0099 inexperience of using them. As a solution to circumvent the barriers of using mobile phones, in this study a set of mobile phones which is connected in a private network using Wi-Fi is considered. An IT application that can be used to manage the private network was developed. A lesson was conducted outside the classroom. Both students and teachers agreed that the mobile phones in a private network supported the outside learning activity and provided a novel learning experience.",
        "authors": [
            "TMSSKY Ekanayake",
            "KB Samarakoon",
            "SDK Wijesundera"
        ],
        "author_info": [
            {
                "name": "TMSSKY Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "KB Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/",
                "type": "STAFF",
                "id": "kamalanath",
                "email": "kamalanath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/kamalanath-samarakoon.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/"
            },
            {
                "name": "SDK Wijesundera",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "http://doi.org/10.20533/licej.2040.2589.2015.0268",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/publication/296809135_Novel_Way_of_Using_Mobile_Phone_for_an_Outside_Science_Learning_Activity",
        "pdf_url": "http://infonomics-society.org/wp-content/uploads/licej/published-papers/volume-6-2015/Novel-Way-of-Using-Mobile-Phone-for-an-Outside-Science-Learning-Activity.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.20533/licej.2040.2589.2015.0268/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.20533/licej.2040.2589.2015.0268/index.json",
        "submitted": "2022/07/27 08:18:50"
    },
    {
        "title": "Support of Mobile Phones in a Private Network for Science Teaching",
        "venue": "International Journal of Interactive Mobile Technologies",
        "year": "2016",
        "abstract": "The potential of mobile phones to facilitate students\u00e2\u0080\u0099 science learning, when they are engaging in group activities, was investigated. To minimize the disciplinary issues emerged from the previous research on mobile devices and to enhance the quality of learning, a set of mobile phones that are connected to a private network was used. The lesson planning and implementation through these mobile phones were facilitated by a web based Application. A purposively selected group of teachers developed three lessons while integrating mobile phones in a private network into learning activities. Then the lessons were implemented in real classroom settings. This paper is based on one of the lessons \u00e2\u0080\u0098Waves and their Characteristics\u00e2\u0080\u0099 that was implemented for Grade 11 students. The data were collected through observations using audio, video and field notes and were analyzed using thematic analysis technique with the help of NVivo10 qualitative data analysis software. Based on the thematic analysis, two assertions were derived. Notably teachers appreciated the support of the private network in enhancing the quality of group learning activity while minimizing the students\u00e2\u0080\u0099 misuse of mobile phones.",
        "authors": [
            "Sakunthala Yatigammana Ekanayake",
            "Kamalanath Samarakoon"
        ],
        "author_info": [
            {
                "name": "Sakunthala Yatigammana Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kamalanath Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/",
                "type": "STAFF",
                "id": "kamalanath",
                "email": "kamalanath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/kamalanath-samarakoon.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/"
            }
        ],
        "doi": "https://doi.org/10.3991/ijim.v10i2.4817",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://online-journals.org/index.php/i-jim/article/view/4817",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Mobile learning",
            "Science education"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.3991/ijim.v10i2.4817/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.3991/ijim.v10i2.4817/index.json",
        "submitted": "2022/07/27 08:22:40"
    },
    {
        "title": "Genetic algorithm based cost optimization to integrate a community based wind turbine while considering smart appliances scheduling",
        "venue": "2017 IEEE International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2017",
        "abstract": "A coordinated approach capable of optimal scheduling of the responsive residential appliances to minimize the total cost of a community based scheme comprises a wind farm is suggested in this study. Here demand side loads are managed by optimizing smart appliances' operating time to minimize the cost to the community using a genetic algorithm based method. The cost optimization is obtained for different test cases using the algorithm implemented and results are discussed.",
        "authors": [
            "AH Wijethunge",
            "JV Wijekulasooriya",
            "Janaka B Ekanayake",
            "KB Samarakoon",
            "A Polpitiya"
        ],
        "author_info": [
            {
                "name": "AH Wijethunge",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "JV Wijekulasooriya",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Janaka B Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "KB Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/",
                "type": "STAFF",
                "id": "kamalanath",
                "email": "kamalanath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/kamalanath-samarakoon.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/"
            },
            {
                "name": "A Polpitiya",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2017.8300374",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Schedules",
            "Genetic algorithms",
            "Optimization",
            "Wind power generation",
            "Power demand",
            "Wind turbines",
            "Mathematical model"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2017.8300374/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2017.8300374/index.json",
        "submitted": "2022/07/27 08:24:15"
    },
    {
        "title": "Comparison of optimization-and rule-based EMS for domestic PV-Battery installation with time-Varying local SoC limits",
        "venue": "Journal of Electrical and Computer Engineering",
        "year": "2019",
        "abstract": "Renewable energy is identified as a solution for the growing future electricity demand. Photovoltaic (PV) is a leading type of renewable energy source used for electricity generation. Among the PV systems, distributed PV systems are becoming popular among the domestic consumers and hence the number of domestic PV installations is on the rise continuously. Intermittent output power variations and inability to use the PV power during the night peak hours are major issues with PV systems. Energy storage is a possible mitigation technique for these issues. In order to effectively utilize local generations, storage, and loads, energy management system (EMS) becomes an essential component in future domestic PV installations. EMS for domestic consumers needs to be inexpensive, while a reasonable accuracy level is maintained. In this paper, optimization problem-based EMS and rule-based EMS were developed and compared to investigate the accuracy and the processing speed, thereby to select a fast and accurate EMS for a domestic PV installation. Furthermore, in the proposed EMS, a day-ahead generation and load profiles are generated from predictions, and thus the battery\u00e2\u0080\u0099s state of charge (SoC) levels over a day is estimated through the EMS. In order to utilize the storage effectively, time-varying local maximum and minimum SoC limits for the battery are introduced, which are inside the global maximum and minimum SoC limits. With the aid of real-PV profiles and typical loading profiles, the EMS was implemented using optimization- and rule-based techniques with local SoC limits. The results verified that the rule-based EMS produced accurate results in comparison to optimization-based EMS with lesser processing time. Further results verified that the introduction of local SoC limits improved the performance of the EMS in the unforeseen conditions.",
        "authors": [
            "Akila Herath",
            "Supun Kodituwakku",
            "Dinithi Dasanayake",
            "Prabath Binduhewa",
            "Janaka Ekanayake",
            "Kamalanath Samarakoon"
        ],
        "author_info": [
            {
                "name": "Akila Herath",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Supun Kodituwakku",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Dinithi Dasanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Prabath Binduhewa",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Janaka Ekanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kamalanath Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/",
                "type": "STAFF",
                "id": "kamalanath",
                "email": "kamalanath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/kamalanath-samarakoon.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/"
            }
        ],
        "doi": "https://doi.org/10.1155/2019/8162475",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://downloads.hindawi.com/journals/jece/2019/8162475.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1155/2019/8162475/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1155/2019/8162475/index.json",
        "submitted": "2022/07/27 08:25:55"
    },
    {
        "title": "The correlation between three teleconnections and leptospirosis incidence in the Kandy District, Sri Lanka, 2004\u00e2\u0080\u00932019",
        "venue": "Tropical medicine and health",
        "year": "2021",
        "abstract": "[Background] Leptospirosis is a bacterial zoonosis. Leptospirosis incidence (LI) in Sri Lanka is high. Infected animals excrete leptospires into the environment via their urine. Survival of leptospires in the environment until they enter into a person and several other factors that influence leptospirosis transmission are dependent upon local weather. Past studies show that rainfall and other weather parameters are correlated with the LI in the Kandy district, Sri Lanka. El Ni\u00c3\u00b1o Southern Oscillation (ENSO), ENSO Modoki, and the Indian Ocean Dipole (IOD) are teleconnections known to be modulating rainfall in Sri Lanka. There is a severe dearth of published studies on the correlations between indices of these teleconnections and LI. [Methods] We acquired the counts of leptospirosis cases notified and midyear estimated population data of the Kandy district from 2004 to 2019, respectively, from weekly epidemiology reports of the Ministry of Health and Department of Census and Statistics of Sri Lanka. We estimated weekly and monthly LI of Kandy. We obtained weekly and monthly teleconnection indices data for the same period from the National Oceanic and Atmospheric Administration (NOAA) of the USA and Japan Agency for Marine-Earth Science and Technology (JAMSTEC). We performed wavelet time series analysis to determine correlations with lag periods between teleconnection indices and LI time series. Then, we did time-lagged detrended cross-correlation analysis (DCCA) to verify wavelet analysis results and to find the magnitudes of the correlations detected. [Results] Wavelet analysis displayed indices of ENSO, IOD, and ENSO Modoki were correlated with the LI of Kandy with 1.9\u00e2\u0080\u009311.5-month lags. Indices of ENSO showed two correlation patterns with Kandy LI. Time-lagged DCCA results show all indices of the three teleconnections studied were significantly correlated with the LI of Kandy with 2\u00e2\u0080\u00935-month lag periods.  [Conclusions] Results of the two analysis methods generally agree indicating that ENSO and IOD modulate LI in Kandy by modulating local rainfall and probably other weather parameters. We recommend further studies about the ENSO Modoki and LI correlation in Sri Lanka. Monitoring for extreme teleconnection events and enhancing preventive measures during lag periods can blunt LI peaks that may follow.",
        "authors": [
            "NDB Ehelepola",
            "Kusalika Ariyaratne",
            "AMSMCM Aththanayake",
            "Kamalanath Samarakoon",
            "HM Thilakarathna"
        ],
        "author_info": [
            {
                "name": "NDB Ehelepola",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kusalika Ariyaratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "AMSMCM Aththanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kamalanath Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/",
                "type": "STAFF",
                "id": "kamalanath",
                "email": "kamalanath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/kamalanath-samarakoon.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/kamalanath-samarakoon/"
            },
            {
                "name": "HM Thilakarathna",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1186/s41182-021-00325-z",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://tropmedhealth.biomedcentral.com/track/pdf/10.1186/s41182-021-00325-z.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1186/s41182-021-00325-z/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1186/s41182-021-00325-z/index.json",
        "submitted": "2022/07/27 08:29:32"
    },
    {
        "title": "BAT\u00e2\u0080\u0094Block Analytics Tool Integrated with Blockchain Based IoT Platform",
        "venue": "Electronics",
        "year": "2020",
        "abstract": "The Internet of Things (IoT) is the novel paradigm of connectivity and the driving force behind state-of-the-art applications and services. However, the exponential growth of the number of IoT devices and services, their distributed nature, and scarcity of resources has increased the number of security and privacy concerns ranging from the risks of unauthorized data alterations to the potential discrimination enabled by data analytics over sensitive information. Thus, a blockchain based IoT-platform is introduced to address these issues. Built upon the tamper-proof architecture, the proposed access management mechanisms ensure the authenticity and integrity of data. Moreover, a novel approach called Block Analytics Tool (BAT), integrated with the platform is proposed to analyze and make predictions on data stored on the blockchain. BAT enables the data-analysis applications to be developed using the data stored in the platform in an optimized manner acting as an interface to off-chain processing. A pharmaceutical supply chain is used as the use case scenario to show the functionality of the proposed platform. Furthermore, a model to forecast the demand of the pharmaceutical drugs is investigated using a real-world data set to demonstrate the functionality of BAT. Finally, the performance of BAT integrated with the platform is evaluated.",
        "authors": [
            "Chathurangi Edussuriya",
            "Kasun Vithanage",
            "Namila Bandara",
            "Janaka Alawatugoda",
            "Manjula Sandirigama",
            "Upul Jayasinghe",
            "Nathan Shone",
            "Gyu Myoung Lee"
        ],
        "author_info": [
            {
                "name": "Chathurangi Edussuriya",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/054/",
                "type": "STUDENT",
                "id": "E/14/054",
                "email": "e14054@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14054.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/054/"
            },
            {
                "name": "Kasun Vithanage",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/413/",
                "type": "STUDENT",
                "id": "E/14/413",
                "email": "e14413@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14413.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/413/"
            },
            {
                "name": "Namila Bandara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Manjula Sandirigama",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/manjula-sandirigama/",
                "type": "STAFF",
                "id": "manjula.sandirigama",
                "email": "manjula.sandirigama@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/manjula-sandirigama.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/manjula-sandirigama/"
            },
            {
                "name": "Upul Jayasinghe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/upul-jayasinghe/",
                "type": "STAFF",
                "id": "upuljm",
                "email": "upuljm@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/upul-jayasinghe.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/upul-jayasinghe/"
            },
            {
                "name": "Nathan Shone",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Gyu Myoung Lee",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.3390/electronics9091525",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://www.mdpi.com/2079-9292/9/9/1525/pdf?version=1600413580",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "IoT",
            "blockchain",
            "data analytics",
            "smart contracts",
            "access management"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.3390/electronics9091525/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.3390/electronics9091525/index.json",
        "submitted": "2022/07/27 08:50:44"
    },
    {
        "title": "Ensuring Academic Integrity of Online Examinations",
        "venue": "2021 IEEE 16th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2021",
        "abstract": "The need for invigilation in any type of examination is a must to maintain academic integrity. Though e-learning systems have grown rapidly, proctors are yet to supervise a larger group of candidates through a live video stream during the examination. Often, online examinations require human invigilation either by live monitoring or inspection of recorded video to ensure academic integrity. This process is not feasible always since exams can be taken at any time and it involves high cost. Hence, this paper proposes an Online Proctoring System to automate invigilation processes by making use of inputs from a web browser, webcam video feed, and microphone audio feed, without using any external hardware or standalone application. Processing the webcam video is one of the main aspects when deciding the abnormal behavior of the candidate and features including head pose detection, eye gaze detection, liveness detection are used for predicting abnormal behaviors in this work. On the other hand, the audio stream is analyzed to detect activities such as asking for help from a person in the room. The evaluation results imply that combining several results and creating an ensemble platform produces better results.",
        "authors": [
            "Mohamed Irfan",
            "Mohammed Aslam",
            "Ziyan Maraikar",
            "Upul Jayasinghe",
            "Mohamed Fawzan"
        ],
        "author_info": [
            {
                "name": "Mohamed Irfan",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/138/",
                "type": "STUDENT",
                "id": "E/15/138",
                "email": "e15138@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15138.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/138/"
            },
            {
                "name": "Mohammed Aslam",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/021/",
                "type": "STUDENT",
                "id": "E/15/021",
                "email": "e15021@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15021.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/021/"
            },
            {
                "name": "Ziyan Maraikar",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/ziyan-maraikar/",
                "type": "STAFF",
                "id": "ziyanm",
                "email": "ziyanm@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/ziyan-maraikar.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/ziyan-maraikar/"
            },
            {
                "name": "Upul Jayasinghe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/upul-jayasinghe/",
                "type": "STAFF",
                "id": "upuljm",
                "email": "upuljm@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/upul-jayasinghe.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/upul-jayasinghe/"
            },
            {
                "name": "Mohamed Fawzan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIIS53135.2021.9660737",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e15/online-proctoring-system/",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Source separation",
            "Webcams",
            "Annotations",
            "Time series analysis",
            "Pose estimation",
            "Streaming media",
            "Feature extraction"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIIS53135.2021.9660737/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIIS53135.2021.9660737/index.json",
        "submitted": "2022/07/27 08:53:22"
    },
    {
        "title": "Microservice Based Edge Computing Architecture for Internet of Things",
        "venue": "2022 2nd International Conference on Advanced Research in Computing (ICARC)",
        "year": "2022",
        "abstract": "Distributed computation and AI processing at the edge has been identified as an efficient solution to deliver real-time IoT services and applications compared to cloud-based paradigms. These solutions are expected to support the delay-sensitive IoT applications, autonomic decision making, and smart service creation at the edge in comparison to traditional IoT solutions. However, existing solutions have limitations concerning distributed and simultaneous resource management for AI computation and data processing at the edge; concurrent and real-time application execution; and platform-independent deployment. Hence, first, we propose a novel three-layer architecture that facilitates the above service requirements. Then we have developed a novel platform and relevant modules with integrated AI processing and edge computer paradigms considering issues related to scalability, heterogeneity, security, and interoperability of IoT services. Further, each component is designed to handle the control signals, data flows, microservice orchestration, and resource composition to match with the IoT application requirements. Finally, the effectiveness of the proposed platform is tested and have been verified.",
        "authors": [
            "Sewwandi Nisansala",
            "Gayal Laksara Chandrasiri",
            "Sonali Prasadika",
            "Upul Jayasinghe"
        ],
        "author_info": [
            {
                "name": "Sewwandi Nisansala",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/243/",
                "type": "STUDENT",
                "id": "E/15/243",
                "email": "e15243@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15243.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/243/"
            },
            {
                "name": "Gayal Laksara Chandrasiri",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/048/",
                "type": "STUDENT",
                "id": "E/15/048",
                "email": "e15048@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15048.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/048/"
            },
            {
                "name": "Sonali Prasadika",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/271/",
                "type": "STUDENT",
                "id": "E/15/271",
                "email": "e15271@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15271.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/271/"
            },
            {
                "name": "Upul Jayasinghe",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/upul-jayasinghe/",
                "type": "STAFF",
                "id": "upuljm",
                "email": "upuljm@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/upul-jayasinghe.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/upul-jayasinghe/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICARC54489.2022.9753930",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://ieeexplore.ieee.org/abstract/document/9753930",
        "presentation_url": "#",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e15/Microservice-Based-Edge-Computing-Architecture/",
        "codebase": "https://github.com/cepdnaclk/e15-4yp-Microservice-Based-Edge-Computing-Architecture",
        "research_groups": [],
        "tags": [
            "Cloud computing",
            "Architecture",
            "Scalability",
            "Microservice architectures",
            "Computer architecture",
            "Real-time systems",
            "Internet of Things"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICARC54489.2022.9753930/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICARC54489.2022.9753930/index.json",
        "submitted": "2022/07/27 08:58:05"
    },
    {
        "title": "Autonomic trust management in cloud-based and highly dynamic IoT applications",
        "venue": "2015 ITU Kaleidoscope: Trust in the Information Society (K-2015)",
        "year": "2015",
        "abstract": "In this paper, we propose an autonomic trust management framework for cloud based and highly dynamic Internet of Things (IoT) applications and services. IoT is creating a world where physical objects are seamlessly integrated in order to provide advanced and intelligent services for human-beings in their day-to-day life style. Therefore, trust on IoT devices plays an important role in IoT based services and applications. Cloud computing has been changing the way how provides are looking into these issues. Many studies have proposed different techniques to address trust management although non of them addresses autonomic trust management in cloud based highly dynamic IoT systems. To our understanding, IoT cloud ecosystems help to solve many of these issues while enhancing robustness and scalability. On this basis, we came up with an autonomic trust management framework based on MAPE-Kfeedback control loop to evaluate the level of trust. Finally, we presents the results that verify the effectiveness of this framework.",
        "authors": [
            "Suneth Namal",
            "Hasindu Gamaarachchi",
            "Gyu MyoungLee",
            "Tai-Won Um"
        ],
        "author_info": [
            {
                "name": "Suneth Namal",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/",
                "type": "STAFF",
                "id": "namal",
                "email": "namal@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/suneth-namal-karunarathna.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/"
            },
            {
                "name": "Hasindu Gamaarachchi",
                "profile": "https://people.ce.pdn.ac.lk/students/e10/102/",
                "type": "STUDENT",
                "id": "E/10/102",
                "email": "hasindu@unsw.edu.au",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e10/e10102.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e10/102/"
            },
            {
                "name": "Gyu MyoungLee",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Tai-Won Um",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/Kaleidoscope.2015.7383635",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://researchonline.ljmu.ac.uk/id/eprint/2150/1/1570197625.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Cloud computing",
            "Security",
            "Biological system modeling",
            "Monitoring",
            "Internet of things",
            "Ecosystems",
            "Scalability"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/Kaleidoscope.2015.7383635/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/Kaleidoscope.2015.7383635/index.json",
        "submitted": "2022/07/31 08:04:03"
    },
    {
        "title": "Implementation of OpenFlow based cognitive radio network architecture: SDN&R",
        "venue": "Wireless Networks",
        "year": "2016",
        "abstract": "The static conventional network architecture is ill-suited to the growing management complexity and highly dynamic wireless network topologies. Software Defined Radio systems and their extension to cognitive and smart radio are characterized by distinct control loops for management which constantly increase network complexity and management inefficiencies, due to clear-cut between radio and core network management. Adding numerous devices and networks together will constantly increase the management cost, thus hinders scalability. Therefore, a holistic solution to synchronize radio and networks status has an elevated demand. To interconnect these systems and devices together, there is a need for a common management interface. OpenFlow is the first standard interface that enables Software Defined Networking (SDN). It can be rolled out in a variety of networking devices to enable improved automation and management by using common Application Program Interfaces to abstract the underlying networking details. The Software Defined Networking & Radio (SDN&R) framework proposed here has a potential combination between SDN and Radio networks to discover the underlying dynamism in cognitive access networks with integrated radio management. By isolating the control plane from the data plane, SDN&R enables a flexible management framework empowered by end-to-end goals through OpenFlow. In this article, we propose, validate, and evaluate the SDN&R architecture. In doing so, first we implement the OpenFlow enabled cognitive basestations (BSs) on Wireless Open-Access Research Platform. Furthermore, we develop software agents on BSs to provide radio status information to the cognitive control application implemented on the SDN controller. The results verify that the proposed framework in-lines with layer-2 or layer-3 forwarding performance. We claim that this work represents the first successful implementation results which synergizes SDN with Cognitive networks that motivates researchers towards SDN based radio resource management.",
        "authors": [
            "Suneth Namal",
            "Ijaz Ahmad",
            "Saad Saud",
            "Markku Jokinen",
            "Andrei Gurtov"
        ],
        "author_info": [
            {
                "name": "Suneth Namal",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/",
                "type": "STAFF",
                "id": "namal",
                "email": "namal@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/suneth-namal-karunarathna.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/"
            },
            {
                "name": "Ijaz Ahmad",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Saad Saud",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Markku Jokinen",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Andrei Gurtov",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1007/s11276-015-0973-5",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://link.springer.com/content/pdf/10.1007/s11276-015-0973-5.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Cognitive networks",
            "OpenFlow",
            "Wireless SDN",
            "Virtual SSID",
            "IEEE 802.11",
            "WARP",
            "5G networks"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1007/s11276-015-0973-5/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1007/s11276-015-0973-5/index.json",
        "submitted": "2022/07/31 08:07:44"
    },
    {
        "title": "Control channel denial-of-service attack in SDN-based networks",
        "venue": "2020 Moratuwa Engineering Research Conference (MERCon)",
        "year": "2020",
        "abstract": "Software-Defined Networking (SDN) is an architectural approach that fulfils the requirement of high bandwidth and the dynamic nature of current applications. One of the key features of the SDN architecture is the separation of the control logic from data plane devices. This key feature introduces a new type of control traffic in the SDN architecture, which opens the space for new vulnerabilities to SDN-based networks. In this paper, we first present an attack model to exploit the control channel of the SDN architecture. We then experimentally evaluate the impact of the attack on the end-users of the SDN-based network using our physical experimental testbed. Our experimental results clearly show that the control channel DoS attack has a major impact on the end-users of the SDN-based networks.",
        "authors": [
            "Shriparen Sriskandarajah",
            "Matthew McKague",
            "Ernest Foo",
            "Roshan G. Ragel",
            "Suneth Namal Karunarathna"
        ],
        "author_info": [
            {
                "name": "Shriparen Sriskandarajah",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Matthew McKague",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Ernest Foo",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan G. Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Suneth Namal Karunarathna",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/",
                "type": "STAFF",
                "id": "namal",
                "email": "namal@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/suneth-namal-karunarathna.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon50084.2020.9185266",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Switches",
            "Computer architecture",
            "Denial-of-service attack",
            "Workstations",
            "Measurement",
            "Servers"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon50084.2020.9185266/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon50084.2020.9185266/index.json",
        "submitted": "2022/07/31 08:10:33"
    },
    {
        "title": "On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks",
        "venue": "2016 Manufacturing & Industrial Engineering Symposium (MIES)",
        "year": "2016",
        "abstract": "Compression is desirable for network applications as it saves bandwidth. Differently, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to the \u00e2\u0080\u009cBrowser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH)\u00e2\u0080\u009d attack on web traffic protected by the TLS protocol. The general guidance to prevent this attack is to disable HTTP compression, preserving confidentiality but sacrificing bandwidth. As a more sophisticated countermeasure, fixed-dictionary compression was introduced in 2015 enabling compression while protecting high-value secrets, such as cookies, from attacks. The fixed-dictionary compression method is a cryptographically sound countermeasure against the BREACH attack, since it is proven secure in a suitable security model. In this project, we integrate the fixed-dictionary compression method as a countermeasure for BREACH attack, for real-world client-server setting. Further, we measure the performance of the fixed-dictionary compression algorithm against the DEFLATE compression algorithm. The results evident that, it is possible to save some amount of bandwidth, with reasonable compression/decompression time compared to DEFLATE operations. The countermeasure is easy to implement and deploy, hence, this would be a possible direction to mitigate the BREACH attack efficiently, rather than stripping off the HTTP compression entirely.",
        "authors": [
            "Isuru Sankalpa",
            "Tharindu Dhanushka",
            "Nadeesha Amarasinghe",
            "Janaka Alawatugoda",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Isuru Sankalpa",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Tharindu Dhanushka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Nadeesha Amarasinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/MIES.2016.7780263",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Dictionaries",
            "Servers",
            "Compression algorithms",
            "Cryptography",
            "Browsers",
            "Encoding",
            "Bandwidth"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MIES.2016.7780263/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MIES.2016.7780263/index.json",
        "submitted": "2022/08/10 21:28:12"
    },
    {
        "title": "Leakage-resilient storage scheme for cryptographic applications",
        "venue": "2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2016",
        "abstract": "Since the side-channel attacks arise as a huge threat for cryptographic schemes than previously realized, it is necessary to implement proven-secure leakage-resilient cryptographic schemes and use them for real-world purposes. In this work our effort is to implement two leakage-resilient cryptographic schemes, a leakage-resilient storage scheme and a refreshing protocol, which have been proven-secure and accepted by the cryptographic community since 2011 (ASIACRYPT 2011). Our aim is to open up the direction for implementing the useful leakage-resilient cryptographic schemes for future usage.",
        "authors": [
            "Janaka Alawatugoda",
            "Roshan Ragel",
            "Danushka Eranga",
            "Nalaka Jayanath",
            "Chinthaka Somathilaka"
        ],
        "author_info": [
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Danushka Eranga",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Nalaka Jayanath",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Chinthaka Somathilaka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2016.7946548",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Side-channel attacks",
            "Protocols",
            "Computational modeling",
            "Timing",
            "Encryption"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2016.7946548/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2016.7946548/index.json",
        "submitted": "2022/08/10 21:30:05"
    },
    {
        "title": "Generic construction of an  eCK -secure key exchange protocol in the standard model",
        "venue": "International Journal of Information Security",
        "year": "2017",
        "abstract": "",
        "authors": [
            "Janaka Alawatugoda"
        ],
        "author_info": [
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            }
        ],
        "doi": "https://doi.org/10.1007/s10207-016-0346-9",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://link.springer.com/content/pdf/10.1007/s10207-016-0346-9.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Public-key cryptography",
            "Key exchange protocols",
            "eCK model",
            "Standard model"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1007/s10207-016-0346-9/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1007/s10207-016-0346-9/index.json",
        "submitted": "2022/08/10 21:33:28"
    },
    {
        "title": "Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting",
        "venue": "International Conference on Provable Security",
        "year": "2017",
        "abstract": "Recently, Chakraborty et al. (Cryptoeprint:2017:441) showed a novel approach of constructing several leakage-resilient cryptographic primitives by introducing a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE). Their construction of LR-NIKE was only in the bounded-memory leakage model, and they left open the construction of LR-NIKE in continuous-memory leakage model. In this paper we address that open problem. Moreover, we extend the continuous-memory leakage model by addressing more realistic after-the-fact leakage. The main ingredients of our construction are a leakage-resilient storage scheme and a refreshing protocol (Dziembowski and Faust, Asiacrypt 2011) and a (standard) chameleon hash function (CHF), equipped with an additional property of oblivious sampling, which we introduce. We observe that the present constructions of CHF already satisfies our new notion. Further, our protocol can be used as a building block to construct leakage-resilient public-key encryption schemes, interactive key exchange and low-latency key exchange protocols in the continuous-memory leakage model, following the approach of Chakraborty et al. (Cryptoeprint:2017:441).",
        "authors": [
            "Suvradip Chakraborty",
            "Janaka Alawatugoda",
            "C Pandu Rangan"
        ],
        "author_info": [
            {
                "name": "Suvradip Chakraborty",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "C Pandu Rangan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1007/978-3-319-68637-0_10",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Leakage-resilient",
            "Key exchange protocols",
            "After-the-fact leakage",
            "Continuous-memory leakage"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1007/978-3-319-68637-0_10/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1007/978-3-319-68637-0_10/index.json",
        "submitted": "2022/08/10 21:35:59"
    },
    {
        "title": "On the leakage-resilient key exchange",
        "venue": "Journal of Mathematical Cryptology",
        "year": "2017",
        "abstract": "Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial leakage of long-term secret keys of key exchange protocol participants due to various side-channel attacks. Security models for two-party authenticated key exchange protocols have been developed over time to provide security even when the adversary learns certain secret values. This paper combines and extends the advances of security modelling for AKE protocols addressing more granular partial leakage of long-term secrets of protocol participants. Further, we fix some flaws in security proofs of previous leakage-resilient key exchange protocols.",
        "authors": [
            "Janaka Alawatugoda"
        ],
        "author_info": [
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            }
        ],
        "doi": "https://doi.org/10.1515/jmc-2016-0003",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://www.degruyter.com/document/doi/10.1515/jmc-2016-0003/pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Key exchange protocols",
            "security models",
            "leakage-resilient cryptography"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1515/jmc-2016-0003/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1515/jmc-2016-0003/index.json",
        "submitted": "2022/08/10 21:38:08"
    },
    {
        "title": "Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack",
        "venue": "2017 IEEE International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2017",
        "abstract": "Header compression is desirable for network applications as it saves bandwidth and reduces latency. However, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. In web requests, headers contain secret web cookies. Therefore, compression of headers before encryption will reveal the information about the secret web cookies. This side-channel has led to Compression Ratio Info-leak Made Easy (CRIME) attack on web traffic protected by the SSL/TLS protocols. In order to mitigate the CRIME attack, compression is completely disabled at the TLS/SSL layer, which in return increases the bandwidth consumption and latency. In a previous work (Financial Cryptography and Data Security 2015), two countermeasures are presented with formal security proofs, against compression side-channel attacks, namely (l)-separating secret cookies from user inputs and (2)-using a static compression dictionary. In this work we create a test environment to replicate the CRIME attack and verify the attack. Moreover, we implement a proven-secure countermeasure against the CRIME attack, in a real world client/server setup, following the aforementioned two countermeasures. Our implementation achieves better compression ratio (closer to the original TLS/SSL compression), and hence reduces the bandwidth usage and latency significantly (therefore cost-effective). To the best of our knowledge, this is the first proven-secure and cost-effective countermeasure implementation against the CRIME attack.",
        "authors": [
            "Jayamine Alupotha",
            "Sanduni Prasadi",
            "Janaka Alawatugoda",
            "Roshan Ragel",
            "Mohamed Fawsan"
        ],
        "author_info": [
            {
                "name": "Jayamine Alupotha",
                "profile": "https://people.ce.pdn.ac.lk/students/e12/009/",
                "type": "STUDENT",
                "id": "E/12/009",
                "email": "jayamine.alupotha@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e12/e12009.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e12/009/"
            },
            {
                "name": "Sanduni Prasadi",
                "profile": "https://people.ce.pdn.ac.lk/students/e12/269/",
                "type": "STUDENT",
                "id": "E/12/269",
                "email": "sanduniprasadi06@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e12/e12269.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e12/269/"
            },
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Mohamed Fawsan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2017.8300359",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/profile/Roshan-Ragel/publication/323352314_Implementing_a_proven-secure_and_cost-effective_countermeasure_against_the_compression_ratio_info-leak_mass_exploitation_CRIME_attack/links/61c959beb8305f7c4b0421bc/Implementing-a-proven-secure-and-cost-effective-countermeasure-against-the-compression-ratio-info-leak-mass-exploitation-CRIME-attack.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Bandwidth",
            "Side-channel attacks",
            "Dictionaries",
            "Servers",
            "Data compression"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2017.8300359/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2017.8300359/index.json",
        "submitted": "2022/08/10 21:42:15"
    },
    {
        "title": "Review on leakage resilient key exchange security models",
        "venue": "International Journal of Communication Networks and Information Security",
        "year": "2019",
        "abstract": "In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defend against leakage attacks. Then, the key exchange protocol is proved with leakage resilient security model to determine whether its security proof can provide the security properties it claimed or to find out any unexamined flaw during protocol building. It is an interesting work to review the meaningful security properties provided by these security models. This work review how a leakage resilient security model for a key exchange protocol has been evolved over years according to the increasing security requirement which covers a different range of attacks. The relationship on how an adversary capability in the leakage resilient security model can be related to real-world attack scenarios is studied. The analysis work for each leakage resilient security model here enables a better knowledge on how an adversary query addresses different leakage attacks setting, thereby understand the motive of design for a cryptographic primitive in the security model.",
        "authors": [
            "Clement Chan Zheng Wei",
            "Chuah Chai Wen",
            "Janaka Alawatugoda\\"
        ],
        "author_info": [
            {
                "name": "Clement Chan Zheng Wei",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Chuah Chai Wen",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Janaka Alawatugoda\\",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.17762/ijcnis.v11i1.3790",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/profile/Clement-Zheng-Wei/publication/332671720_Review_on_Leakage_Resilient_Key_Exchange_Security_Model/links/5cc2c6e1a6fdcc1d49af2c1a/Review-on-Leakage-Resilient-Key-Exchange-Security-Model.pdf",
        "pdf_url": "https://www.ijcnis.org/index.php/ijcnis/article/view/3790/705",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Leakage-resilient cryptography",
            "Key exchange protocol",
            "Security models",
            "Leakage attacks",
            "Side-channel attacks",
            "Leakage resilience"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.17762/ijcnis.v11i1.3790/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.17762/ijcnis.v11i1.3790/index.json",
        "submitted": "2022/08/10 21:46:15"
    },
    {
        "title": "New approach to practical leakage-resilient public-key cryptography",
        "venue": "Journal of Mathematical Cryptology",
        "year": "2020",
        "abstract": "We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce an appropriate security model for LR-NIKE protocols in the bounded memory leakage (BML) settings. We then show a secure construction of the LR-NIKE protocol in the BML setting that achieves an optimal leakage rate, i.e., 1 \u00e2\u0080\u0093 o(1). Our construction of LR-NIKE requires a minimal use of a leak-free hardware component. We argue that the use of such a leak-free hardware component seems to be unavoidable in any construction of an LR-NIKE protocol, even in the BML setting. Finally, we show how to construct the aforementioned leakage-resilient primitives from such an LR-NIKE protocol as summarized below. All these primitives also achieve the same (optimal) leakage rate as the underlying LR-NIKE protocol. We show how to construct a leakage-resilient (LR) IND-CCA-2-secure PKE scheme in the BML model generically from a bounded LR-NIKE (BLR-NIKE) protocol. Our construction of LR-IND-CCA-2 secure PKE differs significantly from the state-of-the-art constructions of these primitives, which mainly use hash proof techniques to achieve leakage resilience. Moreover, our transformation preserves the leakage-rate of the underlying BLR-NIKE protocol. We introduce a new leakage model for AKE protocols, in the BML setting, and present a leakage-resilient AKE protocol construction from the LR-NIKE protocol. We introduce the first-ever leakage model for LLKE protocols in the BML setting and the first construction of such a leakage-resilient LLKE from the LR-NIKE protocol.",
        "authors": [
            "Suvradip Chakraborty",
            "Janaka Alawatugoda",
            "Chandrasekaran Pandu Rangan"
        ],
        "author_info": [
            {
                "name": "Suvradip Chakraborty",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Chandrasekaran Pandu Rangan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1515/jmc-2019-0014",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0014/pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Leakage-resilient cryptography",
            "public-key cryptography",
            "non-interactive key exchange",
            "authenticated key exchange",
            "low-latency key exchange"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1515/jmc-2019-0014/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1515/jmc-2019-0014/index.json",
        "submitted": "2022/08/10 21:49:13"
    },
    {
        "title": "Public-key encryption in the standard model against strong leakage adversary",
        "venue": "The Computer Journal",
        "year": "2020",
        "abstract": "Over the years, security against adaptively chosen-ciphertext attacks (CCA2) is considered as the strongest security definition for public-key encryption schemes. With the uprise of side-channel attacks, new security definitions are proposed, addressing leakage of secret keys together with the standard CCA2 definition. Among the new security definitions, security against continuous and after-the-fact leakage-resilient CCA2 can be considered as the strongest security definition, which is called as security against (continuous) adaptively chosen-ciphertext leakage attacks (continuous CCLA2). In this paper, we present a construction of a public-key encryption scheme, namely LR-PKE, which satisfies the aforementioned security definition. The security of our public-key encryption scheme is proven in the standard model, under decision BDH assumption. Thus, we emphasize that our public-key encryption scheme LR-PKE is (continuous) CCLA2-secure in the standard model. For our construction of LR-PKE, we have used a strong one-time signature scheme and a leakage-resilient refreshing protocol as underlying building blocks. The leakage bound is 0.15nlogp\u00e2\u0088\u00921 bits per leakage query, for a security parameter k and a statistical security parameter n\u00e2\u0081\u00a0, such that logp\u00e2\u0089\u00a5k and n is a function of k\u00e2\u0081\u00a0. It is possible to see that LR-PKE is efficient enough to be used for real-world usage.",
        "authors": [
            "Janaka Alawatugoda"
        ],
        "author_info": [
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            }
        ],
        "doi": "https://doi.org/10.1093/comjnl/bxaa055",
        "is_dept_affiliated": true,
        "preprint_url": "https://research-repository.griffith.edu.au/bitstream/handle/10072/414338/Alawatugoda522794-Accepted.pdf?sequence=2",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1093/comjnl/bxaa055/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1093/comjnl/bxaa055/index.json",
        "submitted": "2022/08/10 21:52:28"
    },
    {
        "title": "On power analysis attacks against hardware stream ciphers",
        "venue": "International Journal of Information and Computer Security",
        "year": "2022",
        "abstract": "Power analysis attacks are a type of attack which measures and analyses the power consumption of electronic circuits to extract secret information, particularly the secret encryption key. These attacks have become a huge threat for embedded systems, in which the security depends on the secret encryption key for the ciphers. Hence, many researchers try to find vulnerabilities of cryptosystems against power analysis attacks, so that they can develop countermeasures to ensure the security of such systems. In this paper, we review some of the recent power analysis attacks on modern hardware stream ciphers such as Trivium, Grain and MICKEY.",
        "authors": [
            "Rangana De Silva",
            "Iranga Navaratna",
            "Malitha Kumarasiri",
            "Janaka Alawatugoda",
            "Chuah Chai Wen"
        ],
        "author_info": [
            {
                "name": "Rangana De Silva",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Iranga Navaratna",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Malitha Kumarasiri",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Chuah Chai Wen",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1504/ijics.2022.121289",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e13/power-analysis-attack-on-trivium-stream-cipher",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "differential power analysis",
            "correlation power analysis",
            "simple power analysis",
            "power analysis attack",
            "stream cipher",
            "Trivium",
            "Grain",
            "MICKEY"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1504/ijics.2022.121289/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1504/ijics.2022.121289/index.json",
        "submitted": "2022/08/10 21:56:27"
    },
    {
        "title": "Standard model leakage-resilient authenticated key exchange using inner-product extractors",
        "venue": "Designs, Codes and Cryptography",
        "year": "2022",
        "abstract": "With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner. Constructing authenticated key exchange protocols using existing cryptographic schemes is an effective method, as such construction can be instantiated with any appropriate scheme in a way that the formal security argument remains valid. In parallel, constructing authenticated key exchange protocols that are proven to be secure in the standard model is more preferred as they rely on real-world assumptions. In this paper, we present a Diffie\u00e2\u0080\u0093Hellman-style construction of a leakage-resilient authenticated key exchange protocol, that can be instantiated with any CCLA2-secure public-key encryption scheme and a function from the pseudo-random function family. Our protocol is proven to be secure in the standard model assuming the hardness of the decisional Diffie\u00e2\u0080\u0093Hellman problem. Furthermore, it is resilient to continuous partial leakage of long-term secret keys, that happens even after the session key is established, while satisfying the security features defined by the eCK security model.",
        "authors": [
            "Janaka Alawatugoda",
            "Tatsuaki Okamoto"
        ],
        "author_info": [
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Tatsuaki Okamoto",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1007/s10623-022-01028-0",
        "is_dept_affiliated": true,
        "preprint_url": "https://eprint.iacr.org/2021/861.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Secure and Reliable Computing (Formal Verification / Cryptography / Blockchain)"
        ],
        "tags": [
            "Leakage-resilient cryptography",
            "Authenticated key exchange",
            "eCK model",
            "CAFL-eCK model",
            "Standard model"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1007/s10623-022-01028-0/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1007/s10623-022-01028-0/index.json",
        "submitted": "2022/08/10 21:58:54"
    },
    {
        "title": "An automatic answering system with template matching for natural language questions",
        "venue": "2010 Fifth International Conference on Information and Automation for Sustainability",
        "year": "2010",
        "abstract": "Using computers to answer natural language questions is an interesting and challenging problem. Generally such problems are handled under two categories: open domain problems and close domain problems. This paper presents a system that attempts to solve close domain problems. Typically, in a close domain, answers to questions are not available in the public domain and therefore they cannot be searched using a search engine. Hence answers have to be stored in a database by a domain expert. Then, the challenge is to understand the natural language question so that the solution could be matched to the respective answer in the database. We use a template matching technique to perform this matching. In addition, given that our target is to use this system with non-native English speakers, we developed a method to overcome the mismatches we might encounter due to spelling mistakes. The system is developed such that the questions can be asked using short messages from a mobile phone and therefore the system is designed to understand SMS language in addition to English. One of the main contributions of this paper is the outcome presented of a deployment of this system in a real environment.",
        "authors": [
            "Tilani Gunawardena",
            "Medhavi Lokuhetti",
            "Nishara Pathirana",
            "Roshan Ragel",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "Tilani Gunawardena",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Medhavi Lokuhetti",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Nishara Pathirana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2010.5715686",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.academia.edu/download/48742704/17.pdf",
        "pdf_url": "#",
        "presentation_url": "https://d1wqtxts1xzle7.cloudfront.net/48742704/17-libre.pdf?1473576218=&response-content-disposition=inline%3B+filename%3DAn_automatic_answering_system_with_templ.pdf&Expires=1663963105&Signature=f8AFZyE5hptWxajcAxQa-2whpQldQ4N75IcTG6sAuwMRWr8n0owYhyMGVzl~nyMC5I0NBcy8NOT46ftIow83kqV7Bt96R03KrQ211dRMFy3IY74dlMFZHmldzNQt9nUpwFKqqV4yBf3mL16VwQTioS63YL9dx6lMkQqWpCYVzu2Xgy87MBNZ5YMUG10kDsFFeGuqdf8uBJIsWci6P0v5HwHyQFO1EJ4buHsy6TG4NAfD4nXi7LA-ISPrqwrY-03JVOx3bHl9ThEiK-VWqoI1tuYDT0KZtatvQXT8XiMD9ACmlJcQ59sQmRfAgxMKdGknnEk-yf~qSXRndgEGjbVYLg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Databases",
            "Syntactics",
            "Natural languages",
            "Computers",
            "Artificial intelligence",
            "Mobile handsets",
            "Robots"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2010.5715686/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2010.5715686/index.json",
        "submitted": "2022/09/24 00:39:47"
    },
    {
        "title": "Fusion of Colour, Shape and Texture Features for Content Based Image Retrieval",
        "venue": "8th International Conference on Computer Science and Education (ICCSE)",
        "year": "2013",
        "abstract": "Image retrieval in general and content based image retrieval in particular are well-known research fields in information management. A large number of methods have been proposed and investigated in both areas but satisfactory general solution have still no been developed. An image contains several types of visual information which are difficult to extract and combine manually by humans. In this paper, we propose a content based image retrieval system based on three major types of visual information: colour, texture and shape, and their distances to the origin in a three dimensional space for the retrieval. We experimentally investigated several feature extraction methods and learning algorithms for content based image retrieval. The results show that 5-Nearest Neighbour yield the highest accuracy for the chosen feature extraction methods.",
        "authors": [
            "Pratheep Anantharatnasamy",
            "Kaavya Sriskandaraja",
            "Vahissan Nandakumar",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "Pratheep Anantharatnasamy",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kaavya Sriskandaraja",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Vahissan Nandakumar",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICCSE.2013.6553949",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Accuracy",
            "Classification algorithms",
            "Computers",
            "Arrays",
            "Image edge detection"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICCSE.2013.6553949/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICCSE.2013.6553949/index.json",
        "submitted": "2022/09/24 00:42:52"
    },
    {
        "title": "Personalized and adaptive user interface framework for mobile application",
        "venue": "2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)",
        "year": "2013",
        "abstract": "User interfaces in mobile applications are complex since they need to provide sufficient features to variety of users in a restricted space where a small number of components are available. When user acquires expertise in the system they expect user interfaces which satisfy their unique needs. Therefore, user interfaces in mobile applications should be adapted to different users. Since this problem exists in various applications a general solution is required to make user interfaces adaptive using user context history. In this paper, we introduce a conceptual prototype framework for mobile applications to make the user interfaces adaptive to the user. This identifies a suitable experience level to a user by learning his/her history of interactions with applications and then displays adaptive user interfaces. A proof of concept application is implemented to inspect the behavior of framework. Further, a user study was conducted on the developed proof of concept application and user context data was stored. This data was used as the training data for the Inference engine. This framework introduces an abstract solution which can be used to adapt various user interfaces based on human computer interactions. We believe the suggested framework can be used in related adaptation for Web applications, desktop applications and other mobile platforms.",
        "authors": [
            "Mahasivam Nivethika",
            "Ilanthalaisingam Vithiya",
            "Sebastiankularatnam Anntharshika",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "Mahasivam Nivethika",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Ilanthalaisingam Vithiya",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sebastiankularatnam Anntharshika",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICACCI.2013.6637474",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "User interfaces",
            "Engines",
            "Mobile communication",
            "Context",
            "Rendering (computer graphics)",
            "Androids",
            "Humanoid robots"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICACCI.2013.6637474/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICACCI.2013.6637474/index.json",
        "submitted": "2022/09/24 00:44:53"
    },
    {
        "title": "AntiPlag: Plagiarism detection on electronic submissions of text based assignments",
        "venue": "2013 IEEE 8th International Conference on Industrial and Information Systems",
        "year": "2013",
        "abstract": "Plagiarism is one of the growing issues in academia and is always a concern in Universities and other academic institutions. The situation is becoming even worse with the availability of ample resources on the web. This paper focuses on creating an effective and fast tool for plagiarism detection for text based electronic assignments. Our plagiarism detection tool named AntiPlag is developed using the tri-gram sequence matching technique. Three sets of text based assignments were tested by AntiPlag and the results were compared against an existing commercial plagiarism detection tool. AntiPlag showed better results in terms of false positives compared to the commercial tool due to the pre-processing steps performed in AntiPlag. In addition, to improve the detection latency, AntiPlag applies a data clustering technique making it four times faster than the commercial tool considered. AntiPlag could be used to isolate plagiarized text based assignments from non-plagiarised assignments easily. Therefore, we present AntiPlag, a fast and effective tool for plagiarism detection on text based electronic assignments.",
        "authors": [
            "MAC Jiffriya",
            "MAC Akmal Jahan",
            "Roshan G Ragel",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "MAC Jiffriya",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "MAC Akmal Jahan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIInfS.2013.6732013",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1403.1310",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Plagiarism",
            "Clustering algorithms",
            "Educational institutions",
            "Information systems",
            "Detectors",
            "Computers",
            "Conferences"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIInfS.2013.6732013/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIInfS.2013.6732013/index.json",
        "submitted": "2022/09/24 00:46:49"
    },
    {
        "title": "Students behavioural analysis in an online learning environment using data mining",
        "venue": "7th International Conference on Information and Automation for Sustainability",
        "year": "2014",
        "abstract": "The focus of this research was to use Educational Data Mining (EDM) techniques to conduct a quantitative analysis of students interaction with an e-learning system through instructor-led non-graded and graded courses. This exercise is useful for establishing a guideline for a series of online short courses for them. A group of 412 students' access behaviour in an e-learning system were analysed and they were grouped into clusters using K-Means clustering method according to their course access log records. The results explained that more than 40% from the student group are passive online learners in both graded and non-graded learning environments. The result showed that the difference in the learning environments could change the online access behaviour of a student group. Clustering divided the student population into five access groups based on their course access behaviour. Among these groups, the least access group (NG-41% and G-42%) and the highest access group (NG-9% and G-5%) could be identified very clearly due to their access variation from the rest of the groups.",
        "authors": [
            "IP Ratnapala",
            "RG Ragel",
            "S Deegalla"
        ],
        "author_info": [
            {
                "name": "IP Ratnapala",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "RG Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "S Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2014.7069609",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/profile/Roshan-Ragel/publication/282666458_Students_Behavioural_Analysis_in_an_Online_Learning_Environment_Using_Data_Mining/links/561791d808ae1a88800485c1/Students-Behavioural-Analysis-in-an-Online-Learning-Environment-Using-Data-Mining.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Data mining",
            "Data visualization",
            "Electronic learning",
            "Clustering algorithms",
            "Materials",
            "Least squares approximations",
            "Databases"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2014.7069609/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2014.7069609/index.json",
        "submitted": "2022/09/24 00:55:24"
    },
    {
        "title": "Performance evaluation techniques for an automatic question answering system",
        "venue": "International Journal of Machine Learning and Computing",
        "year": "2015",
        "abstract": "Automatic question answering (QA) is an interesting and challenging problem. Generally such problems are handled under two categories: open domain problems and close domain problems. Here the challenge is to understand the natural language question so that the solution could be matched to the respective answer in the database. In this paper we used a template matching technique to perform this matching. The first part of the paper discusses about an automatic question answering system that we have developed using template matching techniques. The approach adopted is an automated FAQ (Frequently Asked Question) answering system that provides pre-stored answers to user questions asked in ordinary English and SMS language. The system also has techniques to overcome spelling and grammar mistakes introduced in questions by its users and therefore user-friendly compared to restricted syntax based approaches. The second part of the paper studies three techniques for performance evaluation in the above system which are based on template matching approach: 1) Random classification of templates, 2) Similarity based classification of templates, 3) Weighting template words.",
        "authors": [
            "Tilani Gunawardena",
            "Nishara Pathirana",
            "Medhavi Lokuhetti",
            "Roshan Ragel",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "Tilani Gunawardena",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Nishara Pathirana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Medhavi Lokuhetti",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.7763/IJMLC.2015.V5.523",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "http://www.ijmlc.org/vol5/523-C013.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Evaluation technique",
            "question answering",
            "NLP",
            "template matching",
            "FAQ",
            "answering system"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.7763/IJMLC.2015.V5.523/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.7763/IJMLC.2015.V5.523/index.json",
        "submitted": "2022/09/24 00:57:47"
    },
    {
        "title": "Feasibility of using machine learning to access control in Squid proxy server",
        "venue": "2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2015",
        "abstract": "Fast Internet connectivity and billions of web sites have made World Wide Web an attractive place for people to use the Internet in their day-to-day life. Educational institutes provide the Internet access to students mainly for educational purposes. However, most of the time, students are allowed to access any content on the web. Therefore, the full bandwidth is consumed due to access to non-educational content such as streaming non-educational videos and downloading large image files, etc. Prevention of Internet usage on non-education content is practically difficult due to various reasons. Usually, this is implemented in the proxy server through maintaining a blacklist of URLs. Most of the time, this is a static list of URLs. With the fast growing content on the World Wide Web maintaining a static blacklist is impractical. In this paper, we propose a methodology to generate dynamic blacklist of URLs using machine learning techniques. We experimentally investigate several machine learning algorithms to predict whether the URL in concern is educational or noneducational. The results of the initial experiments show that linear support vector machines can be used to predict the content with 98.9% accuracy.",
        "authors": [
            "Kanchana Ihalagedara",
            "Rajitha Kithuldeniya",
            "Supun Weerasekara",
            "Sampath Deegalla"
        ],
        "author_info": [
            {
                "name": "Kanchana Ihalagedara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Rajitha Kithuldeniya",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Supun Weerasekara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIINFS.2015.7399061",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Manuals",
            "XML",
            "Static VAr compensators"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIINFS.2015.7399061/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIINFS.2015.7399061/index.json",
        "submitted": "2022/09/24 00:59:33"
    },
    {
        "title": "Accelerating k-nn classification algorithm using graphics processing units",
        "venue": "2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2016",
        "abstract": "k-Nearest Neighbor (k-NN) is a well-known classification algorithm used in many machine learning applications. When the input data size of k-NN algorithm increases, the execution time of the algorithm increases significantly. Therefore, this becomes a bottleneck for practical usage. Since k-NN algorithm is using searching, sorting and other parallelly executable tasks, we have implemented the k-NN algorithm on a GPU using CUDA utilizing the parallel tasks. The results were promising as expected and for 43,500 training records and 14,500 testing records with nine attributes, the GPU execution showed about a 100\u00c3\u0097 faster execution time compared to a CPU version.",
        "authors": [
            "S Selvaluxmiy",
            "TN Kumara",
            "P Keerthanan",
            "R Velmakivan",
            "R Ragel",
            "S Deegalla"
        ],
        "author_info": [
            {
                "name": "S Selvaluxmiy",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "TN Kumara",
                "profile": "https://people.ce.pdn.ac.lk/students/e10/143/",
                "type": "STUDENT",
                "id": "E/10/143",
                "email": "titus.nandakumara@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e10/e10143.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e10/143/"
            },
            {
                "name": "P Keerthanan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "R Velmakivan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "R Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "S Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAFS.2016.7946528",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Graphics processing units",
            "Message systems",
            "Kernel",
            "Training",
            "Prediction algorithms",
            "Machine learning algorithms",
            "Testing"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAFS.2016.7946528/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAFS.2016.7946528/index.json",
        "submitted": "2022/09/24 01:01:43"
    },
    {
        "title": "Objectively Measure Player Performance on Olympic Weightlifting",
        "venue": "2021 10th International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2021",
        "abstract": "In Olympic-style weightlifting athlete attempts to lift the weight plates on a barbell and scores are determined by a combination of the successful highest weight achieved in snatch and the clean-and-jerk actions. However, the current method does not objectively measure the player techniques. In this paper, we introduce a novel method to objectively measure player performance on weightlifting using human action recognition in videos. We introduce a method to assess player techniques in weightlifting by using skeleton-based human action recognition. In order to achieve our goal, we further introduce a new video dataset for action recognition in weightlifting which is annotated to frame level and introduce an automated scoring system through action recognition. We conclude our paper with qualitative and quantitative experimental results using non-Olympic players and 2016 Gold, Silver, and Bronze medalists in different weight categories (both men and women).",
        "authors": [
            "Anandi Karunaratne",
            "Chamin Jayasooriya",
            "Sampath Deegalla",
            "Rajitha Navarathna"
        ],
        "author_info": [
            {
                "name": "Anandi Karunaratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Chamin Jayasooriya",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            },
            {
                "name": "Rajitha Navarathna",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAfS52090.2021.9605963",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computer Vision"
        ],
        "tags": [
            "Weight measurement",
            "Silver",
            "Gold",
            "Automation",
            "Current measurement",
            "Sustainable development",
            "Videos"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAfS52090.2021.9605963/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAfS52090.2021.9605963/index.json",
        "submitted": "2022/09/24 01:04:49"
    },
    {
        "title": "An accurate mathematical model predicting number of dengue cases in tropics",
        "venue": "PLoS Neglected Tropical Diseases",
        "year": "2021",
        "abstract": "Dengue fever is a systemic viral infection of epidemic proportions in tropical countries. The incidence of dengue fever is ever increasing and has doubled over the last few decades. Estimated 50million new cases are detected each year and close to 10000 deaths occur each year. Epidemics are unpredictable and unprecedented. When epidemics occur, health services are over whelmed leading to overcrowding of hospitals. At present there is no evidence that dengue epidemics can be predicted. Since the breeding of the dengue mosquito is directly influenced by environmental factors, it is plausible that epidemics could be predicted using weather data. We hypothesized that there is a mathematical relationship between incidence of dengue fever and environmental factors and if such relationship exists, new cases of dengue fever in the succeeding months can be predicted using weather data of the current month. We developed a mathematical model using machine learning technique. We used Island wide dengue epidemiology data, weather data and population density in developing the model. We used incidence of dengue fever, average rain fall, humidity, wind speed, temperature and population density of each district in the model. We found that the model is able to predict the incidence of dengue fever of a given month in a given district with precision (RMSE between 18- 35.3). Further, using weather data of a given month, the number of cases of dengue in succeeding months too can be predicted with precision (RMSE 10.4\u00e2\u0080\u009430). Health authorities can use existing weather data in predicting epidemics in the immediate future and therefore measures to prevent new cases can be taken and more importantly the authorities can prepare local authorities for outbreaks.",
        "authors": [
            "Chathurangi Edussuriya",
            "Sampath Deegalla",
            "Indika Gawarammana"
        ],
        "author_info": [
            {
                "name": "Chathurangi Edussuriya",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/054/",
                "type": "STUDENT",
                "id": "E/14/054",
                "email": "e14054@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14054.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/054/"
            },
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            },
            {
                "name": "Indika Gawarammana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1371/journal.pntd.0009756",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://journals.plos.org/plosntds/article/file?id=10.1371/journal.pntd.0009756&type=printable",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1371/journal.pntd.0009756/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1371/journal.pntd.0009756/index.json",
        "submitted": "2022/09/24 01:07:27"
    },
    {
        "title": "Random subspace and random projection nearest neighbor ensembles for high dimensional data",
        "venue": "Elsevier Expert systems with applications",
        "year": "2022",
        "abstract": "The random subspace and the random projection methods are investigated and compared as techniques for forming ensembles of nearest neighbor classifiers in high dimensional feature spaces. The two methods have been empirically evaluated on three types of high-dimensional datasets: microarrays, chemoinformatics, and images. Experimental results on 34 datasets show that both the random subspace and the random projection method lead to improvements in predictive performance compared to using the standard nearest neighbor classifier, while the best method to use depends on the type of data considered; for the microarray and chemoinformatics datasets, random projection outperforms the random subspace method, while the opposite holds for the image datasets. An analysis using data complexity measures, such as attribute to instance ratio and Fisher\u00e2\u0080\u0099s discriminant ratio, provide some more detailed indications on what relative performance can be expected for specific datasets. The results also indicate that the resulting ensembles may be competitive with state-of-the-art ensemble classifiers; the nearest neighbor ensembles using random projection perform on par with random forests for the microarray and chemoinformatics datasets.",
        "authors": [
            "Sampath Deegalla",
            "Keerthi Walgama",
            "Panagiotis Papapetrou",
            "Henrik Bostr\u00c3\u00b6m"
        ],
        "author_info": [
            {
                "name": "Sampath Deegalla",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/",
                "type": "STAFF",
                "id": "sampath",
                "email": "sampath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/sampath-deegalla.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/sampath-deegalla/"
            },
            {
                "name": "Keerthi Walgama",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Panagiotis Papapetrou",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Henrik Bostr\u00c3\u00b6m",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1016/j.eswa.2021.116078",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.diva-portal.org/smash/get/diva2:1625293/FULLTEXT01.pdf",
        "pdf_url": "https://doi.org/10.1016/j.eswa.2021.116078",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Nearest neighbor ensemble",
            "High dimensional data",
            "Random subspace method",
            "Random projection method"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1016/j.eswa.2021.116078/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1016/j.eswa.2021.116078/index.json",
        "submitted": "2022/09/24 01:09:43"
    },
    {
        "title": "Power-Aware High-Level Synthesis Flow for Mapping FPGA Designs",
        "venue": "2019 Moratuwa Engineering Research Conference (MERCon)",
        "year": "2019",
        "abstract": "Present Field Programmable Gate Array (FPGA) manufacturers incorporate multi-millions of logic resources which enables hardware designers to design applications extending to large scales. However, handling such applications by existing FPGA Computer Aided Design (CAD) flow requires more improvement in terms of area, performance and power efficiency considerations. The current CAD flow requires the input design to be in Register Transfer Level (RTL). RTL input designs limit the design productivity only to hardware experts in performing analysis for various optimisations. Optimising RTL designs manually are increasingly hard. High-Level Synthesis (HLS) is an approach capable of increasing the design productivity of hardware applications compared to commonly used Hardware Description Languages (HDLs) and is known to be an intelligent approach for performing optimisations at a higher level of abstraction. In this paper, an approach that follows the HLS flow to cater to the mapping of FPGA applications in a power efficient manner using a communication-aware partitioning strategy is proposed. From experiments, it was possible to achieve an average reduction of 8.39% routing thermal power and 3.34% total power using the proposed approach.",
        "authors": [
            "Udaree Kanewala",
            "Kesara Gamlath",
            "Hasindu Ramanayake",
            "Kalindu Herath",
            "Isuru Nawinne",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Udaree Kanewala",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kesara Gamlath",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Hasindu Ramanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kalindu Herath",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon.2019.8818883",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Accelerated and High-Performance Computing (FPGA / GPU)",
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Field programmable gate arrays",
            "Power demand",
            "Hardware",
            "Optimization",
            "Tools",
            "Integrated circuit interconnections",
            "Hardware design languages"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon.2019.8818883/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon.2019.8818883/index.json",
        "submitted": "2022/10/15 06:01:02"
    },
    {
        "title": "An ensemble learning approach for electrocardiogram sensor based human emotion recognition",
        "venue": "MDPI Sensors",
        "year": "2019",
        "abstract": "Recently, researchers in the area of biosensor based human emotion recognition have used different types of machine learning models for recognizing human emotions. However, most of them still lack the ability to recognize human emotions with higher classification accuracy incorporating a limited number of bio-sensors. In the domain of machine learning, ensemble learning methods have been successfully applied to solve different types of real-world machine learning problems which require improved classification accuracies. Emphasising on that, this research suggests an ensemble learning approach for developing a machine learning model that can recognize four major human emotions namely: anger; sadness; joy; and pleasure incorporating electrocardiogram (ECG) signals. As feature extraction methods, this analysis combines four ECG signal based techniques, namely: heart rate variability; empirical mode decomposition; with-in beat analysis; and frequency spectrum analysis. The first three feature extraction methods are well-known ECG based feature extraction techniques mentioned in the literature, and the fourth technique is a novel method proposed in this study. The machine learning procedure of this investigation evaluates the performance of a set of well-known ensemble learners for emotion classification and further improves the classification results using feature selection as a prior step to ensemble model training. Compared to the best performing single biosensor based model in the literature, the developed ensemble learner has the accuracy gain of 10.77%. Furthermore, the developed model outperforms most of the multiple biosensor based emotion recognition models with a significantly higher classification accuracy gain.",
        "authors": [
            "Theekshana Dissanayake",
            "Yasitha Rajapaksha",
            "Roshan Ragel",
            "Isuru Nawinne"
        ],
        "author_info": [
            {
                "name": "Theekshana Dissanayake",
                "profile": "https://people.ce.pdn.ac.lk/students/e13/073/",
                "type": "STUDENT",
                "id": "E/13/073",
                "email": "theekshanapubudu1550@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e13/e13073.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e13/073/"
            },
            {
                "name": "Yasitha Rajapaksha",
                "profile": "https://people.ce.pdn.ac.lk/students/e13/274/",
                "type": "STUDENT",
                "id": "E/13/274",
                "email": "yasitha.rajapaksha@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e13/e13274.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e13/274/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            }
        ],
        "doi": "https://doi.org/10.3390/s19204495",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://www.mdpi.com/1424-8220/19/20/4495/pdf?version=1571300841",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "bio-signal processing",
            "wearable computing",
            "ensemble learning",
            "electrocardiogram",
            "machine learning"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.3390/s19204495/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.3390/s19204495/index.json",
        "submitted": "2022/10/15 06:03:48"
    },
    {
        "title": "A Programming Framework for Robot Swarms",
        "venue": "2020 Moratuwa Engineering Research Conference (MERCon)",
        "year": "2020",
        "abstract": "Swarm robotics is a well-evolved research area over the past couple of decades. In this paper, we introduce a framework for programming swarm robots in a novel approach based on behaviour categorization, pheromone communication, and state representation. The framework is packaged with a set of well defined and tested behaviours that are structured based on the level of interactions between robots. These behaviours can be combined and integrated into the user code when implementing new behaviours. Robots function in a user-defined state and perform actions attributed to that state. We have used a behaviour- based bottom-up design approach for designing these behaviours which eventually alleviate the debugging and implementation process. The efficacy of our work is validated using results obtained from a custom-built simulation platform. These results include tests involving an random movement behaviour, an object finding behaviour, and implementation of an aggregation behaviour.",
        "authors": [
            "Mahendra Dassanayaka",
            "Tharuka Bandara",
            "Nadun Adikari",
            "Isuru Nawinne",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Mahendra Dassanayaka",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/065/",
                "type": "STUDENT",
                "id": "E/14/065",
                "email": "e14065@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14065.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/065/"
            },
            {
                "name": "Tharuka Bandara",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/028/",
                "type": "STUDENT",
                "id": "E/14/028",
                "email": "e14028@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14028.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/028/"
            },
            {
                "name": "Nadun Adikari",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/010/",
                "type": "STUDENT",
                "id": "E/14/010",
                "email": "e14010@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14010.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/010/"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon50084.2020.9185206",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Programming",
            "Robot kinematics",
            "Robot sensing systems",
            "Hardware",
            "Libraries",
            "Debugging"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon50084.2020.9185206/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon50084.2020.9185206/index.json",
        "submitted": "2022/10/15 06:05:43"
    },
    {
        "title": "Using Near-Infrared Spectroscopy for Vein Visualization",
        "venue": "2021 10th International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2021",
        "abstract": "Near-Infrared spectroscopy is used for better vein visualization to make the venipuncture process more efficient. There exist a few models that use the said mechanism. However, they are costly, have accuracy and availability issues, and are limited only to certain types of skin tones. Our objectives were to develop a low-cost mechanism of obtaining near-infrared spectroscopy by using the image-guided technique, low-cost hardware, optimized algorithms, and evaluate its efficiency and usefulness by a clinical trial.We have tested the prototype using different combinations of light sources with different intensities and have analyzed the results. To quantitatively analyze, we have compared the number of visible veins under high intensity and low intensity. The number of visible veins is either same or up to 5 veins higher when 18W is used compared to when an intensity of 60W is used. We have also observed that the darker skin tones that have zero visible veins at normal sight result up to 2-3 veins when the prototype is used. The number of veins increased from 1 to 5, when the device was used, on fairer skin as well. We plan to conduct a clinical trial and test the device on human subjects and get feedback from the end-users, and improve the prototype accordingly.",
        "authors": [
            "KTB Weerasinghe",
            "SC Tennakoon",
            "KNU Kularatne",
            "I Nawinne",
            "R Ragel",
            "H Jayakody"
        ],
        "author_info": [
            {
                "name": "KTB Weerasinghe",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/383/",
                "type": "STUDENT",
                "id": "E/15/383",
                "email": "e15383@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15383.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/383/"
            },
            {
                "name": "SC Tennakoon",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/349/",
                "type": "STUDENT",
                "id": "E/15/349",
                "email": "shamal.ten@gmail.com",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15349.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/349/"
            },
            {
                "name": "KNU Kularatne",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/188/",
                "type": "STUDENT",
                "id": "E/15/188",
                "email": "e15188@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15188.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/188/"
            },
            {
                "name": "I Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            },
            {
                "name": "R Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "H Jayakody",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAfS52090.2021.9606126",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Visualization",
            "Veins",
            "Prototypes",
            "Clinical trials",
            "Skin",
            "Real-time systems",
            "Sustainable development"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAfS52090.2021.9606126/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAfS52090.2021.9606126/index.json",
        "submitted": "2022/10/15 06:08:09"
    },
    {
        "title": "Accelerating string matching for bio-computing applications on multi-core CPUs",
        "venue": "2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2012",
        "abstract": "Huge amount of data in the form of strings are being handled in bio-computing applications and searching algorithms are quite frequently used in them. Many methods utilizing on both software and hardware are being proposed to accelerate processing of such data. The typical hardware-based acceleration techniques either require special hardware such as generalpurpose graphics processing units (GPGPUs) or need building a new hardware such as an FPGA based design. On the other hard, software-based acceleration techniques are easier since they only require some changes in the software code or the software architecture. Typical software-based techniques make use of computers connected over a network, also known as a network grid to accelerate the processing. In this paper, we test the hypothesis that multi-core architectures should provide better performance in this kind of computation, but still it would depend on the algorithm selected as well as the programming model being utilized. We present the acceleration of a string-searching algorithm on a multi-core CPU via a POSIX thread based implementation. Our implementation on an 8-core processor (that supports 16-threads) resulted in 9x throughput improvement compared to a single thread implementation.",
        "authors": [
            "Damayanthi Herath",
            "Chathurika Lakmali",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            },
            {
                "name": "Chathurika Lakmali",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIInfS.2012.6304784",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/1403.7294",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computational BioEngineering",
            "Accelerated and High-Performance Computing (FPGA / GPU)"
        ],
        "tags": [
            "Instruction sets",
            "Throughput",
            "Software algorithms",
            "Pattern matching",
            "Acceleration",
            "Algorithm design and analysis"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIInfS.2012.6304784/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIInfS.2012.6304784/index.json",
        "submitted": "2023/03/08 07:36:57"
    },
    {
        "title": "Detection of Novel Biomarker Genes of Alzheimer\u00e2\u0080\u0099s Disease Using Gene Expression Data",
        "venue": "2020 Moratuwa Engineering Research Conference (MERCon)",
        "year": "2020",
        "abstract": "It is well recognized, that most common form of dementia is Alzheimer's disease and a successful cure or medication is not discovered. A plethora of research has been conducted to understand the underlying mechanism and the pathogenesis of the Alzheimer's disease. To explore the underlying genetic structure of the disease, gene expression data is being used by many researches and computational and statistical approaches were used to identify possible genes that are risk. In this paper, we propose a machine learning framework that can be used to identify possible bio-marker genes. Our experiments discover possible set of 14 genes, which some of them are validated by biological sources. We also present a critical analysis of the propose machine learning framework using GSE5281 gene dataset.",
        "authors": [
            "Shehan Perera",
            "Kaveesha Hewage",
            "Chamara Gunarathne",
            "Rajitha Navarathna",
            "Damayanthi Herath",
            "Roshan G Ragel"
        ],
        "author_info": [
            {
                "name": "Shehan Perera",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Kaveesha Hewage",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Chamara Gunarathne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Rajitha Navarathna",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            },
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon50084.2020.9185336",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.researchgate.net/profile/Roshan-Ragel/publication/346705332_Detection_of_Novel_Biomarker_Genes_of_Alzheimer's_Disease_Using_Gene_Expression_Data/links/607ffd468ea909241e1273dd/Detection-of-Novel-Biomarker-Genes-of-Alzheimers-Disease-Using-Gene-Expression-Data.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computational BioEngineering"
        ],
        "tags": [
            "Principal component analysis",
            "Feature extraction",
            "Forestry",
            "Correlation",
            "Support vector machines",
            "Dementia"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon50084.2020.9185336/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon50084.2020.9185336/index.json",
        "submitted": "2023/03/08 07:38:55"
    },
    {
        "title": "A Data Driven Binning Method to Recover More Nucleotide Sequences of Species in a Metagenome",
        "venue": "2020 Moratuwa Engineering Research Conference (MERCon)",
        "year": "2020",
        "abstract": "Metagenomics accelerated the process of studying different species and their dynamics in multiple environments. A key step in a metagenomic study is to group nucleotide sequences belonging to an individual or closely related species which is often termed binning. Multiple machine learning techniques have been adopted in binning metagenomic sequences. Specifically, unsupervised learning is being used in most of the recent binning methods. This work considers data-driven methods for binning metagenomic sequences and discusses such approaches in detail. Furthermore, it explores on increasing the amount of metagenomic sequences binned while maintaining a reasonable binning accuracy. Consequently, a dissimilarity-based approach is proposed to improve the number of contigs binned by an existing binning method. It is shown to result in a 10% increase in the number of contigs binned compared to the original approach. Accordingly, this work suggests that the effective use of observed data which may be discarded as outliers otherwise, may result in improved performance in binning.",
        "authors": [
            "Kasun Vimukthi",
            "Geeth Wimalasiri",
            "Prabhath Bandara",
            "Damayanthi Herath"
        ],
        "author_info": [
            {
                "name": "Kasun Vimukthi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Geeth Wimalasiri",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Prabhath Bandara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            }
        ],
        "doi": "https://doi.org/10.1109/MERCon50084.2020.9185388",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computational BioEngineering"
        ],
        "tags": [
            "Genomics",
            "DNA",
            "Sequential analysis",
            "Bioinformatics",
            "Taxonomy",
            "Clustering algorithms",
            "Benchmark testing"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/MERCon50084.2020.9185388/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/MERCon50084.2020.9185388/index.json",
        "submitted": "2023/03/08 07:40:50"
    },
    {
        "title": "miRNAFinder: A pre-microRNA classifier for plants and analysis of feature impact",
        "venue": "2020 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB)",
        "year": "2020",
        "abstract": "MicroRNAs (miRNAs) are endogenous small noncoding RNAs that play an important role in post-transcriptional gene regulation. Several machine learning-based studies have been conducted for miRNA identification with the use of miRNA features. It is difficult to classify real and pseudo-pre-miRNAs in plant species than that in animals since plant pre-miRNAs are more diverse than the animal pre-miRNAs. Therefore, this study is focused on classifying real and pseudo precursor miRNAs (pre-miRNAs) in plants. We have introduced a machine learning model based on a 280 feature set including compositional, sequence-based, and thermodynamic features. Classification performance is tested and compared, considering different feature sets and four different classifiers. Random forest classifier results in the best classification performance with all 280 features with a 97% accuracy for the testing dataset.",
        "authors": [
            "Puwasuru Ihalagedara",
            "Sandali Lokuge",
            "Shyaman Jayasundara",
            "Damayanthi Herath",
            "Indika Kahanda"
        ],
        "author_info": [
            {
                "name": "Puwasuru Ihalagedara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sandali Lokuge",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Shyaman Jayasundara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            },
            {
                "name": "Indika Kahanda",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/CIBCB48159.2020.9277723",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computational BioEngineering"
        ],
        "tags": [
            "Feature extraction",
            "RNA",
            "Support vector machines",
            "Testing",
            "Animals",
            "Vegetation",
            "Random forests"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/CIBCB48159.2020.9277723/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/CIBCB48159.2020.9277723/index.json",
        "submitted": "2023/03/08 07:42:54"
    },
    {
        "title": "Revealing MicroRNA Biomarkers for Alzheimer\u00e2\u0080\u0099s Disease Using Next Generation Sequencing Data",
        "venue": "2021 10th International Conference on Information and Automation for Sustainability (ICIAfS)",
        "year": "2021",
        "abstract": "",
        "authors": [
            "Imalsha Dinuwanthi",
            "Hasini Thilakarathna",
            "Vidwa Sripadi",
            "Damayanthi Herath",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Imalsha Dinuwanthi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Hasini Thilakarathna",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Vidwa Sripadi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIAfS52090.2021.9606093",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [
            "Computational BioEngineering"
        ],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIAfS52090.2021.9606093/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIAfS52090.2021.9606093/index.json",
        "submitted": "2023/03/08 07:45:35"
    },
    {
        "title": "Transfer Learning for Accurate and Efficient Tomato Plant Disease Classification Using Leaf Images",
        "venue": "2021 IEEE 16th International Conference on Industrial and Information Systems (ICIIS)",
        "year": "2021",
        "abstract": "",
        "authors": [
            "LA Chamli Deshan",
            "MK Hans Thisanke",
            "Damayanthi Herath"
        ],
        "author_info": [
            {
                "name": "LA Chamli Deshan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "MK Hans Thisanke",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICIIS53135.2021.9660681",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICIIS53135.2021.9660681/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICIIS53135.2021.9660681/index.json",
        "submitted": "2023/03/08 07:46:29"
    },
    {
        "title": "Interpretable Student Performance Prediction Using Explainable Boosting Machine for Multi-Class Classification",
        "venue": "2022 2nd International Conference on Advanced Research in Computing (ICARC)",
        "year": "2022",
        "abstract": "",
        "authors": [
            "Shyaman Jayasundara",
            "Amila Indika",
            "Damayanthi Herath"
        ],
        "author_info": [
            {
                "name": "Shyaman Jayasundara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Amila Indika",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICARC54489.2022.9753867",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICARC54489.2022.9753867/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICARC54489.2022.9753867/index.json",
        "submitted": "2023/03/08 07:47:22"
    },
    {
        "title": "Forecasting Electricity Power Generation of Pawan Danavi Wind Farm, Sri Lanka, Using Gene Expression Programming",
        "venue": "Applied Computational Intelligence and Soft Computing",
        "year": "2022",
        "abstract": "",
        "authors": [
            "Damayanthi Herath",
            "Jeevani Jayasinghe",
            "Upaka Rathnayake"
        ],
        "author_info": [
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            },
            {
                "name": "Jeevani Jayasinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Upaka Rathnayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1155/2022/7081444",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://downloads.hindawi.com/journals/acisc/2022/7081444.pdf",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1155/2022/7081444/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1155/2022/7081444/index.json",
        "submitted": "2023/03/08 07:48:44"
    },
    {
        "title": "miRNAFinder: A comprehensive web resource for plant Pre-microRNA classification",
        "venue": "Biosystems",
        "year": "2022",
        "abstract": "",
        "authors": [
            "Sandali Lokuge",
            "Shyaman Jayasundara",
            "Puwasuru Ihalagedara",
            "Indika Kahanda",
            "Damayanthi Herath"
        ],
        "author_info": [
            {
                "name": "Sandali Lokuge",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Shyaman Jayasundara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Puwasuru Ihalagedara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Indika Kahanda",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            }
        ],
        "doi": "https://doi.org/10.1016/j.biosystems.2022.104662",
        "is_dept_affiliated": true,
        "preprint_url": "https://www.biorxiv.org/content/10.1101/2021.06.30.450478.full.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1016/j.biosystems.2022.104662/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1016/j.biosystems.2022.104662/index.json",
        "submitted": "2023/03/08 07:50:15"
    },
    {
        "title": "DeepSelectNet: deep neural network based selective sequencing for oxford nanopore sequencing",
        "venue": "BMC bioinformatics",
        "year": "2023",
        "abstract": "",
        "authors": [
            "Anjana Senanayake",
            "Hasindu Gamaarachchi",
            "Damayanthi Herath",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Anjana Senanayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Hasindu Gamaarachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.1186/s12859-023-05151-0",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://doi.org/10.1186/s12859-023-05151-0",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "https://github.com/AnjanaSenanayake/DeepSelectNet",
        "research_groups": [
            "Computational BioEngineering"
        ],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1186/s12859-023-05151-0/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1186/s12859-023-05151-0/index.json",
        "submitted": "2023/03/08 07:53:25"
    },
    {
        "title": "An expert design environment for electrical devices and its engineering assistant",
        "venue": "IEEE Transactions on Magnetics",
        "year": "2003",
        "abstract": "The authors present their conceptual design of an automated design environment for electric motors, its tools, and their implementation. From suitable specifications and requirements, the challenging automation of the initial stage of engineering design involves the use of heuristic and experiential knowledge of experts. This is followed by mathematical optimization of the initial design. The authors focus here on their knowledge-based engineering assistant that employs codified rules of the National Electrical Manufacturers' Association.",
        "authors": [
            "S.R.H. Hoole",
            "A. Mascrenghe",
            "K. Navukkarasu",
            "K. Sivasubramaniam"
        ],
        "author_info": [
            {
                "name": "S.R.H. Hoole",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "A. Mascrenghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "K. Navukkarasu",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "K. Sivasubramaniam",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1109/TMAG.2003.810189",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Design engineering",
            "Mesh generation",
            "Knowledge engineering",
            "Design optimization",
            "Software prototyping",
            "Prototypes",
            "Electric motors",
            "Process design",
            "Finite element methods",
            "Software libraries"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/TMAG.2003.810189/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/TMAG.2003.810189/index.json",
        "submitted": "2023/03/18 22:38:19"
    },
    {
        "title": "IMPRES: integrated monitoring for processor reliability and security",
        "venue": "Proceedings of the 43rd annual Design Automation Conference",
        "year": "2006",
        "abstract": "Security and reliability in processor based systems are concernsrequiring adroit solutions.Securityis often compromised by code injection attacks, jeopardizing even `trusted software'.Reliabilityis of concern where unintended code is executed in modern processors with ever smaller feature sizes and low voltage swings causing bit flips. Countermeasures by software-only approaches increasecodesize by large amounts and therefore significantly reduce performance. Hardware assisted approaches add extensive amountsofhardware monitors and thus incur unacceptably highhardware cost. This paper presents a novel hardware/softwaretechniqueat the granularity of micro-instructions to reduce overheads considerably. Experiments show thatour technique incurs an additional hardware overhead of 0.91% and clock period increase of 0.06%. Average clock cycle and code size overheads are just 11.9% and 10.6% forfive industrystandard application benchmarks. These overheads are far smaller than have been previously encountered.",
        "authors": [
            "Roshan G Ragel",
            "Sri Parameswaran"
        ],
        "author_info": [
            {
                "name": "Roshan G Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Sri Parameswaran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1145/1146909.1147041",
        "is_dept_affiliated": false,
        "preprint_url": "https://www.researchgate.net/profile/Roshan-Ragel/publication/261279320_IMPRES_integrated_monitoring_for_processor_reliability_and_security/links/5738bc7708ae9f741b2bd424/IMPRES-integrated-monitoring-for-processor-reliability-and-security.pdf",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Hardware",
            "Hardware test",
            "Robustness"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1145/1146909.1147041/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1145/1146909.1147041/index.json",
        "submitted": "2023/04/13 21:23:19"
    },
    {
        "title": "Internet of things (IoT) for smart agriculture: Assembling and assessment of a low-cost IoT system for polytunnels",
        "venue": "PLOS One",
        "year": "2023",
        "abstract": "Internet of things (IoT) applications in smart agricultural systems vary from monitoring climate conditions, automating irrigation systems, greenhouse automation, crop monitoring and management, and crop prediction, up to end-to-end autonomous farm management systems. One of the main challenges to the advancement of IoT systems for the agricultural domain is the lack of training data under operational environmental conditions. Most of the current designs are based on simulations and artificially generated data. Therefore, the essential first step is studying and understanding the finely tuned and highly sensitive mechanism plants have developed to sense, respond, and adapt to changes in their environment, and their behavior under field and controlled systems. Therefore, this study was designed to achieve two specific objectives; to develop low-cost IoT components from basic building blocks, and to study the performance of the developed systems, and generate real-time experimental data, with and without plants. Low-cost IoT devices developed locally were used to convert existing basic polytunnels to semi-controlled and monitoring-only polytunnels. Their performances were analyzed and compared with each other based on several matrices while maintaining the planted tomato variety and agronomic practices similar. The developed system performed as expected suggesting the possibility of commercial applications and research purposes.",
        "authors": [
            "Nuwan Jaliyagoda",
            "Sandali Lokuge",
            "P.M.P.C. Gunathilake",
            "K.S.P. Amaratunga",
            "W.A.P.Weerakkody",
            "Pradeepa Bandaranayake",
            "Asitha Bandaranayake"
        ],
        "author_info": [
            {
                "name": "Nuwan Jaliyagoda",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/140/",
                "type": "STUDENT",
                "id": "E/15/140",
                "email": "nuwanjaliyagoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15140.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/140/"
            },
            {
                "name": "Sandali Lokuge",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/194/",
                "type": "STUDENT",
                "id": "E/14/194",
                "email": "e14194@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14194.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/194/"
            },
            {
                "name": "P.M.P.C. Gunathilake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "K.S.P. Amaratunga",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "W.A.P.Weerakkody",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Pradeepa Bandaranayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Asitha Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            }
        ],
        "doi": "https://doi.org/10.1371/journal.pone.0278440",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0278440&type=printable",
        "presentation_url": "#",
        "project_url": "https://projects.ce.pdn.ac.lk/greenhouse-automation/",
        "codebase": "https://github.com/cepdnaclk/Smart-Agriculture-a-low-cost-IoT-system-for-polytunnels",
        "research_groups": [
            "Smart and Intelligent Systems (IoT / AI / Wearable Computing)"
        ],
        "tags": [
            "IoT",
            "Smart Farming",
            "Control Systems",
            "Agriculture"
        ],
        "funding": "The Early Career Fellowship of the Organization for Women in Science for Developing World (OWSD, Early Career Fellowship https://owsd.net/) funded this project \u00e2\u0080\u0093 the award agreement 4500406736 was awarded to Pradeepa C.G. Bandaranayake",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1371/journal.pone.0278440/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1371/journal.pone.0278440/index.json",
        "submitted": "2023/06/01 10:14:54"
    },
    {
        "title": "Mixed-Reality Based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments",
        "venue": "IEEE Access",
        "year": "2023",
        "abstract": "",
        "authors": [
            "Dilshani Karunarathna",
            "Nuwan Jaliyagoda",
            "Ganindu Jayalath",
            "Janaka Alawatugoda",
            "Roshan Ragel",
            "Isuru Nawinne"
        ],
        "author_info": [
            {
                "name": "Dilshani Karunarathna",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/173/",
                "type": "STUDENT",
                "id": "E/15/173",
                "email": "dilshanik@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15173.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/173/"
            },
            {
                "name": "Nuwan Jaliyagoda",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/140/",
                "type": "STUDENT",
                "id": "E/15/140",
                "email": "nuwanjaliyagoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15140.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/140/"
            },
            {
                "name": "Ganindu Jayalath",
                "profile": "https://people.ce.pdn.ac.lk/students/e15/142/",
                "type": "STUDENT",
                "id": "E/15/142",
                "email": "dhananja.jayalath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e15/e15142.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e15/142/"
            },
            {
                "name": "Janaka Alawatugoda",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/",
                "type": "STAFF",
                "id": "alawatugoda",
                "email": "alawatugoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/janaka-alawatugoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/janaka-alawatugoda/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            }
        ],
        "doi": "https://doi.org/10.1109/ACCESS.2023.3317434",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "https://youtu.be/UxYynRS6BR0",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e15/Mixed-Reality-based-Simulation-Platform-for-Swarm-Robotics/",
        "codebase": "https://github.com/Pera-Swarm",
        "research_groups": [
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Robotics",
            "Simulation"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ACCESS.2023.3317434/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ACCESS.2023.3317434/index.json",
        "submitted": "2023/10/04 14:30:26"
    },
    {
        "title": "Genetic features of Sri Lankan elephant, Elephas maximus maximus Linnaeus revealed by high throughput sequencing of mitogenome and ddRAD-seq",
        "venue": "PLOS One",
        "year": "2023",
        "abstract": "Elephas maximus maximus Linnaeus, the Sri Lankan subspecies is the largest and the darkest among Asian elephants. Patches of depigmented areas with no skin color on the ears, face, trunk, and belly morphologically differentiate it from the others. The elephant population in Sri Lanka is now limited to smaller areas and protected under Sri Lankan law. Despite its ecological and evolutionary importance, the relationship between Sri Lankan elephants and their phylogenetic position among Asian elephants remains controversial. While identifying genetic diversity is the key to any conservation and management strategies, limited data is currently available. To address such issues, we analyzed 24 elephants with known parental lineages with high throughput ddRAD-seq. The mitogenome suggested the coalescence time of the Sri Lankan elephant at ~0.2 million years, and sister to Myanmar elephants supporting the hypothesis of the movement of elephants in Eurasia. The ddRAD-seq approach identified 50,490 genome-wide SNPs among Sri Lankan elephants. The genetic diversity within Sri Lankan elephants assessed with identified SNPs suggests a geographical differentiation resulting in three main clusters; north-eastern, mid-latitude, and southern regions. Interestingly, though it was believed that elephants from the Sinharaja rainforest are of an isolated population, the ddRAD-based genetic analysis clustered it with the north-eastern elephants. The effect of habitat fragmentation on genetic diversity could be further assessed with more samples with specific SNPs identified in the current study.",
        "authors": [
            "MGC Sooriyabandara",
            "JMSM Jayasundara",
            "MSLRP Marasinghe",
            "HABM Hathurusinghe",
            "AU Bandaranayake",
            "KANC Jayawardane",
            "RMR Nilanthi",
            "RC Rajapakse",
            "PCG Bandaranayake"
        ],
        "author_info": [
            {
                "name": "MGC Sooriyabandara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "JMSM Jayasundara",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/154/",
                "type": "STUDENT",
                "id": "E/14/154",
                "email": "jmshyaman@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14154.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/154/"
            },
            {
                "name": "MSLRP Marasinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "HABM Hathurusinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "AU Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            },
            {
                "name": "KANC Jayawardane",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "RMR Nilanthi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "RC Rajapakse",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "PCG Bandaranayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1371/journal.pone.0285572",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0285572&type=printable",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "Eco-System Conservation Management Project (ESCAMP) of the World Bank [through Department of Wildlife Conservation (DWC)]",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1371/journal.pone.0285572/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1371/journal.pone.0285572/index.json",
        "submitted": "2025/06/15 09:51:25"
    },
    {
        "title": "Semantic segmentation using Vision Transformers: A survey",
        "venue": "Engineering Applications of Artificial Intelligence",
        "year": "2023",
        "abstract": "Semantic segmentation has a broad range of applications in a variety of domains including land coverage analysis, autonomous driving, and medical image analysis. Convolutional neural networks (CNN) and Vision Transformers (ViTs) provide the architecture models for semantic segmentation. Even though ViTs have proven success in image classification, they cannot be directly applied to dense prediction tasks such as image segmentation and object detection since ViT is not a general purpose backbone due to its patch partitioning scheme. In this survey, we discuss some of the different ViT architectures that can be used for semantic segmentation and how their evolution managed the above-stated challenge. The rise of ViT and its performance with a high success rate motivated the community to slowly replace the traditional convolutional neural networks in various computer vision tasks. This survey aims to review and compare the performances of ViT architectures designed for semantic segmentation using benchmarking datasets. This will be worthwhile for the community to yield knowledge regarding the implementations carried out in semantic segmentation and to discover more efficient methodologies using ViTs.",
        "authors": [
            "Hans Thisanke",
            "Chamli Deshan",
            "Kavindu Chamith",
            "Sachith Seneviratne",
            "Rajith Vidanaarachchi",
            "Damayanthi Herath"
        ],
        "author_info": [
            {
                "name": "Hans Thisanke",
                "profile": "https://people.ce.pdn.ac.lk/students/e16/368/",
                "type": "STUDENT",
                "id": "E/16/368",
                "email": "e16368@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e16/e16368.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e16/368/"
            },
            {
                "name": "Chamli Deshan",
                "profile": "https://people.ce.pdn.ac.lk/students/e16/076/",
                "type": "STUDENT",
                "id": "E/16/076",
                "email": "e16076@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e16/e16076.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e16/076/"
            },
            {
                "name": "Kavindu Chamith",
                "profile": "https://people.ce.pdn.ac.lk/students/e16/057/",
                "type": "STUDENT",
                "id": "E/16/057",
                "email": "e16057@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e16/e16057.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e16/057/"
            },
            {
                "name": "Sachith Seneviratne",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Rajith Vidanaarachchi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Damayanthi Herath",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/",
                "type": "STAFF",
                "id": "damayanthiherath",
                "email": "damayanthiherath@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/damayanthi-herath.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/damayanthi-herath/"
            }
        ],
        "doi": "https://doi.org/10.1016/j.engappai.2023.106669",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/2305.03273",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e16/Using-Computer-Vision-and-Agent-Based-Modelling-to-Explore-the-Human-Elephant-Conflict/",
        "codebase": "https://github.com/cepdnaclk/e16-4yp-Using-Computer-Vision-and-Agent-Based-Modelling-to-Explore-the-Human-Elephant-Conflict",
        "research_groups": [
            "Computer Vision"
        ],
        "tags": [
            "vision transformer",
            "semantic segmentation",
            "review",
            "survey",
            "convolution neural networks",
            "self-supervised learning",
            "deep learning"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1016/j.engappai.2023.106669/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1016/j.engappai.2023.106669/index.json",
        "submitted": "2025/06/15 13:21:43"
    },
    {
        "title": "ViT-RoT: Vision Transformer-Based Robust Framework for Tomato Leaf Disease Recognition",
        "venue": "AgriEngineering (MDPI) Journal",
        "year": "2025",
        "abstract": "Vision transformers (ViTs) have recently gained traction in plant disease classification due to their strong performance in visual recognition tasks. However, their application to tomato leaf disease recognition remains challenged by two factors, namely the need for models that can generalise across diverse disease conditions and the absence of a unified framework for systematic comparison. Existing ViT-based approaches often yield inconsistent results across datasets and disease types, limiting their reliability and practical deployment. To address these limitations, this study proposes the ViT-Based Robust Framework (ViT-RoT), a novel benchmarking framework designed to systematically evaluate the performance of various ViT architectures in tomato leaf disease classification. The framework facilitates the systematic classification of state-of-the-art ViT variants into high-, moderate-, and low-performing groups for tomato leaf disease recognition. A thorough empirical analysis is conducted using one publicly available benchmark dataset, assessed through standard evaluation metrics. Results demonstrate that the ConvNeXt-Small and Swin-Small models consistently achieve superior accuracy and robustness across all datasets. Beyond identifying the most effective ViT variant, the study highlights critical considerations for designing ViT-based models that are not only accurate but also efficient and adaptable to real-world agricultural applications. This study contributes a structured foundation for future research and development in vision-based plant disease diagnosis.",
        "authors": [
            "Sathiyamohan Nishankar",
            "Velalagan Pavindran",
            "Thurairatnam Mithuran",
            "Sivaraj Nimishan",
            "Selvarajah Thuseethan",
            "Yakub Sebastian"
        ],
        "author_info": [
            {
                "name": "Sathiyamohan Nishankar",
                "profile": "https://people.ce.pdn.ac.lk/students/e17/230/",
                "type": "STUDENT",
                "id": "E/17/230",
                "email": "e17230@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e17/e17230.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e17/230/"
            },
            {
                "name": "Velalagan Pavindran",
                "profile": "https://people.ce.pdn.ac.lk/students/e21/283/",
                "type": "STUDENT",
                "id": "E/21/283",
                "email": "e21283@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e21/e21283.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e21/283/"
            },
            {
                "name": "Thurairatnam Mithuran",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Sivaraj Nimishan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Selvarajah Thuseethan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Yakub Sebastian",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.3390/agriengineering7060185",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Vision Transformer (ViT)",
            "Plant Disease Detection",
            "Deep Learning",
            "ViT-RoT Framework",
            "Precision Agriculture"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.3390/agriengineering7060185/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.3390/agriengineering7060185/index.json",
        "submitted": "2025/06/15 15:14:22"
    },
    {
        "title": "A unique single nucleotide polymorphism in Agouti Signalling Protein (ASIP) gene changes coat colour of Sri Lankan leopard (Panthera pardus kotiya) to dark black",
        "venue": "PLOS One",
        "year": "2023",
        "abstract": "The Sri Lankan leopard (Panthera pardus kotiya) is an endangered subspecies restricted to isolated and fragmented populations in Sri Lanka. Among them, melanistic leopards have been recorded on a few occasions. Literature suggests the evolution of melanism several times in the Felidae family, with three species having distinct mutations. Nevertheless, the mutations or other variations in the remaining species, including Sri Lankan melanistic leopard, are unknown. We used reference-based assembled nuclear genomes of Sri Lankan wild type and melanistic leopards and de novo assembled mitogenomes of the same to investigate the genetic basis, adaptive significance, and evolutionary history of the Sri Lankan melanistic leopard. Interestingly, we identified a single nucleotide polymorphism in exon-4 Sri Lankan melanistic leopard, which may completely ablate Agouti Signalling Protein (ASIP) function. The wild type leopards in Sri Lanka did not carry this mutation, suggesting the cause for the occurrence of melanistic leopords in the population. Comparative analysis of existing genomic data in the literature suggests it as a P. p. kotiya specific mutation and a novel mutation in the ASIP-gene of the Felidae family, contributing to naturally occurring colour polymorphism. Our data suggested the coalescence time of Sri Lankan leopards at ~0.5 million years, sisters to the Panthera pardus lineage. The genetic diversity was low in Sri Lankan leopards. Further, the P. p. kotiya melanistic leopard is a different morphotype of the P. p. kotiya wildtype leopard resulting from the mutation in the ASIP-gene. The ability of black leopards to camouflage, along with the likelihood of recurrence and transfer to future generations, suggests that this rare mutation could be environment-adaptable.",
        "authors": [
            "M. G. C. Sooriyabandara",
            "A. U. Bandaranayake",
            "H. A. B. M. Hathurusinghe",
            "S. M. Jayasundara",
            "M. S. R. R. P. Marasinghe",
            "G. A. T. Prasad",
            "V. P. M. K. Abeywardana",
            "M. A. Pinidiya",
            "R. M. R. Nilanthi",
            "P. C. G. Bandaranayake"
        ],
        "author_info": [
            {
                "name": "M. G. C. Sooriyabandara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "A. U. Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            },
            {
                "name": "H. A. B. M. Hathurusinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "S. M. Jayasundara",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/154/",
                "type": "STUDENT",
                "id": "E/14/154",
                "email": "jmshyaman@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14154.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/154/"
            },
            {
                "name": "M. S. R. R. P. Marasinghe",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "G. A. T. Prasad",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "V. P. M. K. Abeywardana",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "M. A. Pinidiya",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "R. M. R. Nilanthi",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "P. C. G. Bandaranayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1371/journal.pone.0269967",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0269967&type=printable",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "Eco-System Conservation Management Project (ESCAMP) of the World Bank through the Department of Wildlife Conservation (DWC)",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1371/journal.pone.0269967/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1371/journal.pone.0269967/index.json",
        "submitted": "2025/06/15 16:48:25"
    },
    {
        "title": "Chloroplast genome, nuclear ITS regions, mitogenome regions, and Skmer analysis resolved the genetic relationship among Cinnamomum species in Sri Lanka",
        "venue": "PLOS One",
        "year": "2023",
        "abstract": "Cinnamomum species have gained worldwide attention because of their economic benefits. Among them, C. verum (synonymous with C. zeylanicum Blume), commonly known as Ceylon Cinnamon or True Cinnamon is mainly produced in Sri Lanka. In addition, Sri Lanka is home to seven endemic wild cinnamon species, C. capparu-coronde, C. citriodorum, C. dubium, C. litseifolium, C. ovalifolium, C. rivulorum and C. sinharajaense. Proper identification and genetic characterization are fundamental for the conservation and commercialization of these species. While some species can be identified based on distinct morphological or chemical traits, others cannot be identified easily morphologically or chemically. The DNA barcoding using rbcL, matK, and trnH-psbA regions could not also resolve the identification of Cinnamomum species in Sri Lanka. Therefore, we generated Illumina Hiseq data of about 20x coverage for each identified species and a C. verum sample (India) and assembled the chloroplast genome, nuclear ITS regions, and several mitochondrial genes, and conducted Skmer analysis. Chloroplast genomes of all eight species were assembled using a seed-based method.According to the Bayesian phylogenomic tree constructed with the complete chloroplast genomes, the C. verum (Sri Lanka) is sister to previously sequenced C. verum (NC_035236.1, KY635878.1), C. dubium and C. rivulorum. The C. verum sample from India is sister to C. litseifolium and C. ovalifolium. According to the ITS regions studied, C. verum (Sri Lanka) is sister to C. verum (NC_035236.1), C. dubium and C. rivulorum. Cinnamomum verum (India) shares an identical ITS region with C. ovalifolium, C. litseifolium, C. citriodorum, and C. capparu-coronde. According to the Skmer analysis C. verum (Sri Lanka) is sister to C. dubium and C. rivulorum, whereas C. verum (India) is sister to C. ovalifolium, and C. litseifolium. The chloroplast gene ycf1 was identified as a chloroplast barcode for the identification of Cinnamomum species. We identified an 18 bp indel region in the ycf1 gene, that could differentiate C. verum (India) and C. verum (Sri Lanka) samples tested.",
        "authors": [
            "Pradeepa CG Bandaranayake",
            "Nathasha Naranpanawa",
            "CHWMR Bhagya Chandrasekara",
            "Hiruna Samarakoon",
            "S Lokuge",
            "S Jayasundara",
            "Asitha U Bandaranayake",
            "DKNG Pushpakumara",
            "D Siril A Wijesundara"
        ],
        "author_info": [
            {
                "name": "Pradeepa CG Bandaranayake",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Nathasha Naranpanawa",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "CHWMR Bhagya Chandrasekara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Hiruna Samarakoon",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/302/",
                "type": "STUDENT",
                "id": "E/14/302",
                "email": "e14302@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14302.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/302/"
            },
            {
                "name": "S Lokuge",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/194/",
                "type": "STUDENT",
                "id": "E/14/194",
                "email": "e14194@ce.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14194.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/194/"
            },
            {
                "name": "S Jayasundara",
                "profile": "https://people.ce.pdn.ac.lk/students/e14/154/",
                "type": "STUDENT",
                "id": "E/14/154",
                "email": "jmshyaman@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e14/e14154.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e14/154/"
            },
            {
                "name": "Asitha U Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            },
            {
                "name": "DKNG Pushpakumara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "D Siril A Wijesundara",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            }
        ],
        "doi": "https://doi.org/10.1371/journal.pone.0291763",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0291763&type=printable",
        "presentation_url": "#",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "National Science Foundation (NSF SP/CIN/2016/01)",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1371/journal.pone.0291763/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1371/journal.pone.0291763/index.json",
        "submitted": "2025/06/15 17:03:37"
    },
    {
        "title": "Prediction of Dengue Outbreaks in Sri Lanka Using Machine Learning Techniques",
        "venue": "Sri Lanka Journal of Medicine",
        "year": "2025",
        "abstract": "Dengue outbreaks pose a significant public health challenge in tropical and subtropical regions globally, necessitating effective predictive models for early detection and intervention. This study examines the complex nature of the disease by analyzing weather parameters such as temperature, wind speed, precipitation, and humidity. Through machine learning techniques, we successfully forecasted dengue outbreaks in nine districts in Sri Lanka and identified similar weather and dengue patterns in districts such as Gampaha, Colombo, Kandy and Kurunegala. These findings are important for developing an early warning system, optimizing public health measures, and efficiently allocating resources to minimize the negative impact on communities. Furthermore, the model offers valuable insights for epidemiological research on dengue spread and control.",
        "authors": [
            "HU Uduwanage",
            "KMSL Konara",
            "GDR Mihiranga",
            "SN Karunarathna",
            "F Noordeen",
            "I Ekanayake"
        ],
        "author_info": [
            {
                "name": "HU Uduwanage",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/368/",
                "type": "STUDENT",
                "id": "E/18/368",
                "email": "e18368@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18368.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/368/"
            },
            {
                "name": "KMSL Konara",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/181/",
                "type": "STUDENT",
                "id": "E/18/181",
                "email": "e18181@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18181.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/181/"
            },
            {
                "name": "GDR Mihiranga",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/224/",
                "type": "STUDENT",
                "id": "E/18/224",
                "email": "e18224@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18224.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/224/"
            },
            {
                "name": "SN Karunarathna",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/",
                "type": "STAFF",
                "id": "namal",
                "email": "namal@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/suneth-namal-karunarathna.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/suneth-namal-karunarathna/"
            },
            {
                "name": "F Noordeen",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "I Ekanayake",
                "profile": "https://people.ce.pdn.ac.lk/",
                "type": "STAFF",
                "id": "imeshuek",
                "email": "imeshuek@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/temporary-academic-staff/imesh-ekanayake.png",
                "profile_url": "https://people.ce.pdn.ac.lk/"
            }
        ],
        "doi": "https://sljm.sljol.info/articles/10.4038/sljm.v34i1.568",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://sljm.sljol.info/articles/568/files/68060c4a7bc38.pdf",
        "presentation_url": "https://gamma.app/docs/FYP-Forecasting-Dengue-Outbreaks-in-Sri-Lanka-q0tby8ocrsu3brh?mode=doc",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e18/Dengue-outbreak-prediction-in-Sri-Lanka-using-machine-learning-techniques/",
        "codebase": "https://github.com/cepdnaclk/e18-4yp-Dengue-outbreak-prediction-in-Sri-Lanka-using-machine-learning-techniques",
        "research_groups": [
            "Computational BioEngineering",
            "Machine Learning and Data Mining"
        ],
        "tags": [
            "Dengue",
            "Dengue outbreak prediction",
            "Machine learning",
            "Early warning system",
            "Time series forecasting"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/sljm.sljol.info/articles/10.4038/sljm.v34i1.568/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/sljm.sljol.info/articles/10.4038/sljm.v34i1.568/index.json",
        "submitted": "2025/06/15 21:57:06"
    },
    {
        "title": "Analyzing and Predicting the Volatile Market Patterns for Trading in International Markets Using a Digital Twin",
        "venue": "Asia Pacific Advanced Network Conference (APANConf 2024)",
        "year": "2025",
        "abstract": "This paper investigates the use of DRL-driven digital twins in digit trading. The proposed system used a Deep Q-Network (DQN) agent to predict market digit values. The simulated digital twin optimized the trading strategies using loss filtering algorithms. The DQN agent demonstrated effective prediction results, closely tracking market dynamics and outperforming the random prediction baseline for trading operations. This system\u00e2\u0080\u0099s critical features were dynamic position sizing and rebalancing mechanisms designed for digit trading. The research highlighted the potential of DRL-driven digital twins in enhancing trading performance by mitigating risks and increasing the rate of return with risk tolerance through loss-filtering operations. Future directions involve developing specialized agents for specific prediction tasks and exploring multi-agent RL digit trading systems. The findings emphasized the advancements that DRL-driven digital twins can bring to financial market strategies, positioning them as valuable tools for achieving consistent and optimized trading performance.",
        "authors": [
            "Ishta H. Jayakody",
            "Mahela Bandara",
            "Asitha U. Bandaranayake"
        ],
        "author_info": [
            {
                "name": "Ishta H. Jayakody",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/149/",
                "type": "STUDENT",
                "id": "E/18/149",
                "email": "e18149@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18149.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/149/"
            },
            {
                "name": "Mahela Bandara",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/036/",
                "type": "STUDENT",
                "id": "E/18/036",
                "email": "e18036@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18036.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/036/"
            },
            {
                "name": "Asitha U. Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            }
        ],
        "doi": "https://doi.org/10.1007/978-3-031-89813-6_9",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "https://link.springer.com/chapter/10.1007/978-3-031-89813-6_9#citeas",
        "presentation_url": "#",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e18/Analyzing-and-predicting-the-volatile-market-patterns-for-trading-using-a-Digital-Twin/",
        "codebase": "https://github.com/cepdnaclk/e18-4yp-Analyzing-and-predicting-the-volatile-market-patterns-for-trading-using-a-Digital-Twin",
        "research_groups": [
            "Smart and Intelligent Systems (IoT / AI / Wearable Computing)"
        ],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1007/978-3-031-89813-6_9/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1007/978-3-031-89813-6_9/index.json",
        "submitted": "2025/06/15 22:55:33"
    },
    {
        "title": "Optimized Multi-Processor System-on-Chip (MPSoC) Design for Low-Resource JPEG Encoding",
        "venue": "2024 6th International Conference on Advancements in Computing (ICAC)",
        "year": "2024",
        "abstract": "This paper presents the design and optimization of a Multiprocessor System-on-Chip (MPSoC) architecture for low-resource JPEG encoding. The initial design employs six Central Processing Units (CPUs) to implement a pipelined JPEG encoder, divided into stages: color space conversion, level shifting, discrete cosine transform (DCT), quantization, Huffman encoding, and output buffering. The pipeline is then optimized using custom hardware components, including First-In-First-Out (FIFO) queues, custom instruction blocks, and superscalar pipelines to improve performance and efficiency. The paper details the design process, various optimization strategies, implementation challenges, and the resulting performance improvements. The system is implemented and evaluated using the Cyclone IV E Field Programmable Gate Array (FPGA) platform with Nios II/e processors, and the design was developed using the Quartus II software, demonstrating significant gains in throughput and resource efficiency.",
        "authors": [
            "Kanishka Gunawardana",
            "Chandula Adhikari",
            "Isuru Nawinne"
        ],
        "author_info": [
            {
                "name": "Kanishka Gunawardana",
                "profile": "https://people.ce.pdn.ac.lk/students/e19/129/",
                "type": "STUDENT",
                "id": "E/19/129",
                "email": "e19129@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e19/e19129.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e19/129/"
            },
            {
                "name": "Chandula Adhikari",
                "profile": "https://people.ce.pdn.ac.lk/students/e19/008/",
                "type": "STUDENT",
                "id": "E/19/008",
                "email": "e19008@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e19/e19008.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e19/008/"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICAC64487.2024.10851123",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "https://docs.google.com/presentation/d/1HL9plLBTpVUnhCRvR60QFavVoz-p8put/edit?usp=sharing&ouid=102981076134475622858&rtpof=true&sd=true",
        "project_url": "#",
        "codebase": "#",
        "research_groups": [],
        "tags": [
            "Image coding",
            "Quantization (signal)",
            "Pipelines",
            "Transform coding",
            "Computer architecture",
            "Throughput",
            "Hardware",
            "System-on-chip",
            "Discrete cosine transforms",
            "Optimization"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICAC64487.2024.10851123/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICAC64487.2024.10851123/index.json",
        "submitted": "2025/06/17 15:32:04"
    },
    {
        "title": "A Comparative Study on Generalized Automated Medical Image Segmentation for Dataset Building",
        "venue": "2025 5th International Conference on Advanced Research in Computing (ICARC)",
        "year": "2025",
        "abstract": "Medical image annotation is an essential process specifically for computer-aided systems, playing a key role in building robust datasets for various clinical applications, such as diagnosis and treatment planning. Manual annotation, while accurate, is labor-intensive and time-consuming, necessitating the development of automated solutions to enhance efficiency and scalability. In terms of automated solutions, given a novel annotation task, clinical annotators may face challenges in retraining or fine-tuning existing state-of-the-art deep learning models for medical images, which is time-consuming and requires expert knowledge. Few-shot learning approaches are gaining popularity for their capability of generalizing to unseen annotation tasks involving new anatomies and image modalities with a limited number of example sets of image-label pairs without the need of additional re-training and fine-tuning. In this work, we conduct a comprehensive study of the generalizability of state-of-the-art segmentation models for medical images, addressing their performance on diverse medical datasets and their limitations to identify an effective model for generalized automated medical image segmentation. The experimental results demonstrate the effectiveness of these approaches, highlighting their potential to significantly improve the efficiency of medical image annotation and thereby support various clinical applications more effectively.",
        "authors": [
            "Nishani Kasineshan",
            "Vithurshini Subramanieam",
            "Thulasiyan Yogeswaran",
            "Sashini Liyanage",
            "Isuri Devindi",
            "Roshan G. Ragel",
            "Vajira Thambawita",
            "Isuru Nawinne"
        ],
        "author_info": [
            {
                "name": "Nishani Kasineshan",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/245/",
                "type": "STUDENT",
                "id": "E/18/245",
                "email": "e18245@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18245.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/245/"
            },
            {
                "name": "Vithurshini Subramanieam",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/340/",
                "type": "STUDENT",
                "id": "E/18/340",
                "email": "e18340@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18340.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/340/"
            },
            {
                "name": "Thulasiyan Yogeswaran",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/366/",
                "type": "STUDENT",
                "id": "E/18/366",
                "email": "e18366@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18366.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/366/"
            },
            {
                "name": "Sashini Liyanage",
                "profile": "https://people.ce.pdn.ac.lk/",
                "type": "STAFF",
                "id": "e17190",
                "email": "e17190@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/temporary-academic-staff/sashini-liyanage.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/"
            },
            {
                "name": "Isuri Devindi",
                "profile": "https://people.ce.pdn.ac.lk/",
                "type": "STAFF",
                "id": "isurid",
                "email": "isurid@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/temporary-academic-staff/isuri-devindi.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/"
            },
            {
                "name": "Roshan G. Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Vajira Thambawita",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            }
        ],
        "doi": "https://doi.org/10.1109/ICARC64760.2025.10963209",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "https://docs.google.com/presentation/d/1DkLqAkhmkS3W8LeAGbo-FGcpYn9kMrSI/edit?usp=sharing&ouid=114988696377185749026&rtpof=true&sd=true",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e18/Automated-Medical-Image-Annotation-for-Dataset-Building/",
        "codebase": "https://github.com/cepdnaclk/e18-4yp-Automated-Medical-Image-Annotation-for-Dataset-Building",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/ICARC64760.2025.10963209/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/ICARC64760.2025.10963209/index.json",
        "submitted": "2025/06/17 21:21:55"
    },
    {
        "title": "Analyzing and Predicting the Volatile Market Patterns for Trading in International Markets Using a Digital Twin",
        "venue": "International Conference on Asia Pacific Advanced Network (APANConf 2024)",
        "year": "2025",
        "abstract": "This paper investigates the use of DRL-driven digital twins in digit trading. The proposed system used a Deep Q-Network (DQN) agent to predict market digit values. The simulated digital twin optimized the trading strategies using loss filtering algorithms. The DQN agent demonstrated effective prediction results, closely tracking market dynamics and outperforming the random prediction baseline for trading operations. This system\u00e2\u0080\u0099s critical features were dynamic position sizing and rebalancing mechanisms designed for digit trading. The research highlighted the potential of DRL-driven digital twins in enhancing trading performance by mitigating risks and increasing the rate of return with risk tolerance through loss-filtering operations. Future directions involve developing specialized agents for specific prediction tasks and exploring multi-agent RL digit trading systems. The findings emphasized the advancements that DRL-driven digital twins can bring to financial market strategies, positioning them as valuable tools for achieving consistent and optimized trading performance.",
        "authors": [
            "Ishta H Jayakody",
            "Mahela Bandara",
            "Asitha U Bandaranayake"
        ],
        "author_info": [
            {
                "name": "Ishta H Jayakody",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/149/",
                "type": "STUDENT",
                "id": "E/18/149",
                "email": "e18149@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18149.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/149/"
            },
            {
                "name": "Mahela Bandara",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/036/",
                "type": "STUDENT",
                "id": "E/18/036",
                "email": "e18036@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18036.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/036/"
            },
            {
                "name": "Asitha U Bandaranayake",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/",
                "type": "STAFF",
                "id": "asithab",
                "email": "asithab@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/asitha-bandaranayake.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/asitha-bandaranayake/"
            }
        ],
        "doi": "https://doi.org/10.1007/978-3-031-89813-6_9",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "#",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e18/Analyzing-and-predicting-the-volatile-market-patterns-for-trading-using-a-Digital-Twin/",
        "codebase": "#",
        "research_groups": [],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1007/978-3-031-89813-6_9/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1007/978-3-031-89813-6_9/index.json",
        "submitted": "2025/06/17 21:58:20"
    },
    {
        "title": "Simultaneous Localization and Mapping with Cost Effective Sensors",
        "venue": "2025 International Research Conference on Smart Computing and Systems Engineering (SCSE)",
        "year": "2025",
        "abstract": "This paper explores the fascinating field of swarm robotics, where multiple robots collaborate to achieve tasks in a decentralized and distributed manner. The focus here is on the exploratory behavior of swarm robotics, including aggregation, dispersion, and collective movement. The system is represented as an occupancy grid problem and heuristic-based algorithms are used as optimized solutions. The decentralized approach within those methods makes them easier to idealize with current swarm robotic applications. Furthermore, these algorithms can be seamlessly integrated with other current frontier-based exploration techniques to enhance robot cooperation. All these proposed methods have been tested in different simulation environments, which mimic real world scenarios.",
        "authors": [
            "Dinuka Mudalige",
            "Nipun Dharmarathne",
            "Yojith Jayarathna",
            "Nuwan Jaliyagoda",
            "Akila Karunanayake",
            "Roshan Ragel",
            "Isuru Nawinne"
        ],
        "author_info": [
            {
                "name": "Dinuka Mudalige",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/227/",
                "type": "STUDENT",
                "id": "E/18/227",
                "email": "e18227@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/default.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/227/"
            },
            {
                "name": "Nipun Dharmarathne",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/077/",
                "type": "STUDENT",
                "id": "E/18/077",
                "email": "e18077@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18077.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/077/"
            },
            {
                "name": "Yojith Jayarathna",
                "profile": "https://people.ce.pdn.ac.lk/students/e18/150/",
                "type": "STUDENT",
                "id": "E/18/150",
                "email": "e18150@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e18/e18150.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e18/150/"
            },
            {
                "name": "Nuwan Jaliyagoda",
                "profile": "https://people.ce.pdn.ac.lk/",
                "type": "STAFF",
                "id": "nuwanjaliyagoda",
                "email": "nuwanjaliyagoda@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/temporary-academic-staff/nuwan-jaliyagoda.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/"
            },
            {
                "name": "Akila Karunanayake",
                "profile": "https://people.ce.pdn.ac.lk/students/e17/154/",
                "type": "STUDENT",
                "id": "E/17/154",
                "email": "e17154@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e17/e17154.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e17/154/"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            },
            {
                "name": "Isuru Nawinne",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/",
                "type": "STAFF",
                "id": "isurunawinne",
                "email": "isurunawinne@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/isuru-nawinne.png",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/isuru-nawinne/"
            }
        ],
        "doi": "https://doi.org/10.1109/SCSE65633.2025.11030968",
        "is_dept_affiliated": true,
        "preprint_url": "#",
        "pdf_url": "#",
        "presentation_url": "https://docs.google.com/presentation/d/1Sn4Bnb49-N23yy5Edn8H73UVxVlOOfMW/edit?usp=sharing&ouid=109340424230456226213&rtpof=true&sd=true",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e18/PeraSwarm-Simultaneous-Localization-and-Mapping-in-Mixed-Reality-Environment/",
        "codebase": "https://github.com/cepdnaclk/e18-4yp-PeraSwarm-Simultaneous-Localization-and-Mapping-in-Mixed-Reality-Environment",
        "research_groups": [
            "Smart and Intelligent Systems (IoT / AI / Wearable Computing)",
            "ESCAL: Computer Systems (Embedded Systems / Robotics )"
        ],
        "tags": [
            "Swarm Robotics",
            "Collaborative Mapping",
            "Swarm Intelligence",
            "Mixed Reality"
        ],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.1109/SCSE65633.2025.11030968/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.1109/SCSE65633.2025.11030968/index.json",
        "submitted": "2025/08/07 10:20:44"
    },
    {
        "title": "Unified Spatio-Temporal Tri-Perspective View Representation for 3D Semantic Occupancy Prediction",
        "venue": "Machine Learning for Autonomous Driving Workshop, The 39th Annual AAAI Conference on Artificial Intelligence (AAAI-W) 2025",
        "year": "2025",
        "abstract": "Holistic understanding and reasoning in 3D scenes are crucial for the success of autonomous driving systems. The evolution of 3D semantic occupancy prediction as a pretraining task for autonomous driving and robotic applications captures finer 3D details compared to traditional 3D detection methods. Vision-based 3D semantic occupancy prediction is increasingly overlooked in favor of LiDAR-based approaches, which have shown superior performance in recent years. However, we present compelling evidence that there is still potential for enhancing vision-based methods. Existing approaches predominantly focus on spatial cues such as tri-perspective view (TPV) embeddings, often overlooking temporal cues. This study introduces S2TPVFormer, a spatiotemporal transformer architecture designed to predict temporally coherent 3D semantic occupancy. By introducing temporal cues through a novel Temporal Cross-View Hybrid Attention mechanism (TCVHA), we generate Spatiotemporal TPV (S2TPV) embeddings that enhance the prior process. Experimental evaluations on the nuScenes dataset demonstrate a significant +4.1% of absolute gain in mean Intersection over Union (mIoU) for 3D semantic occupancy compared to baseline TPVFormer, validating the effectiveness of S2TPVFormer in advancing 3D scene perception.",
        "authors": [
            "Sathira Silva",
            "Savindu Wannigama",
            "Gihan Jayatilaka",
            "Muhammad Haris Khan",
            "Roshan Ragel"
        ],
        "author_info": [
            {
                "name": "Sathira Silva",
                "profile": "https://people.ce.pdn.ac.lk/students/e17/331/",
                "type": "STUDENT",
                "id": "E/17/331",
                "email": "e17331@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e17/e17331.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e17/331/"
            },
            {
                "name": "Savindu Wannigama",
                "profile": "https://people.ce.pdn.ac.lk/students/e17/369/",
                "type": "STUDENT",
                "id": "E/17/369",
                "email": "e17369@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk/images/students/e17/e17369.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/students/e17/369/"
            },
            {
                "name": "Gihan Jayatilaka",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Muhammad Haris Khan",
                "profile": "#",
                "type": "OUTSIDER",
                "id": "",
                "email": "",
                "profile_image": "#",
                "profile_url": "#"
            },
            {
                "name": "Roshan Ragel",
                "profile": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/",
                "type": "STAFF",
                "id": "roshanr",
                "email": "roshanr@eng.pdn.ac.lk",
                "profile_image": "https://people.ce.pdn.ac.lk//images/staff/academic-staff/roshan-ragel.jpg",
                "profile_url": "https://people.ce.pdn.ac.lk/staff/academic/roshan-ragel/"
            }
        ],
        "doi": "https://doi.org/10.48550/arXiv.2401.13785",
        "is_dept_affiliated": true,
        "preprint_url": "https://arxiv.org/pdf/2401.13785",
        "pdf_url": "https://ml4ad.github.io/files/papers2025/A%20Spatiotemporal%20Approach%20to%20Tri-Perspective%20Representation%20for%203D%20Semantic%20Occupancy%20Prediction.pdf",
        "presentation_url": "https://www.cs.umd.edu/~gihan/projects/s2tpv/aaai-presentation.pdf",
        "project_url": "https://projects.ce.pdn.ac.lk/4yp/e17/S2TPVFormer/",
        "codebase": "https://github.com/cepdnaclk/e17-4yp-S2TPVFormer",
        "research_groups": [
            "Computer Vision"
        ],
        "tags": [],
        "funding": "",
        "api_url": "https://api.ce.pdn.ac.lk/publications/v1/10.48550/arXiv.2401.13785/",
        "edit_url": "https://github.com/cepdnaclk/api.ce.pdn.ac.lk/blob/main/publications/v1/10.48550/arXiv.2401.13785/index.json",
        "submitted": "2026/03/06 11:50:25"
    }
]