Browsing by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 809 to 828 of 2619 < previous   next >
Issue DateTitleAuthor(s)
2017Identity distribution and session handling in microservice architectureKumarasingha, S.U.
2021-08-03Identity Management Service Based on Blockchain and Smart Contracts to Recover Dynamic Identities and Multiple IdentitiesJinathissa, N.M.S.I
2021-08-06ii Analysis of social media feedback to gain profit for business organizations using sentiment analysis techniquesWijewickrama, G.A.I.T.
2014-05-26ILSB: Indexing with Least Significant Bit Algorithm for Effective Data HidingSenarathne, A.N.
2017Image based Driver Assistance with 360 Surround ViewJayasinghe, P. D. K.
2014-06-02IMAGE MANAGEMENT SYSTEM (IMS)Mathangasinghe, R.P.
2023-06-22Image Processing Based Approach to Determine the Angle of Incidence for Bullet Holes, in Aid of Shooting Incident ReconstructionAriyarathna, W. R. C.
2014-05-20Image Reconstruction to Identify License Plate Numbers in Low Resolution VideosMallikarachchi, H.M.T.L.
12/19/2013Image Searching with Eigen Faces and Facial CharacteristicsAyesha, K.H.A.
2022-08-26‘iMediCare’ System for Doctor-Patient InteractionsIllankoon, I.A.A.V.
2014-05-26iMediPlants Recognizer An Intelligent tool to recognize Ayurvedic Medicinal Plants of Sri LankaJayathilake, T.A.D.N.G.
2013-09-24Impact of Different Factors on the Selection of the Degree Stream of University StudentsDinushka, M.D.S.
2021-07-26Impact of dynamic soft constraints on generation of timetables for UCSC postgraduate coursesBogahawatta, P. B. K. P
2022-08-26Impact of Events on Stock Market and Prediction of Impact status and PeriodWijayaweera, V.P.
2021-07-26IMPACT OF STUDENTS' INTERACTIONS ON THEIR ACADEMIC PERFORMANCE IN AN ONLINE LEARNING ENVIRONMENT: A DATA-DRIVEN APPROACHDe Silva, W.A.P.P.R.; Imalika, W.A.C.I.
2013-10-22Impact of the Selection of Streams on High Failure Rate in Advanced Level ExaminationSamaranayake, C.P.
2015-12-03Implementation and Evaluation of an Alternate Method of Confidentiality without Conventional Cryptographic AlgorithmsLokuhetty, D.K.
2013-11-07Implementation insights and performance evaluation of Island-wide network infrastructure for Bank of CeylonKariyawasam, H.N.
2016-09-14Implementation of an Elliptic Curve Cryptography (ECC) based Authentication Framework for Contiki to Secure Internet of Things (IOT)Anushka, K.P. Boominda
2021-08-11Implementation of online motor traffic violation management systemWickramasinghe, S.T.