<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>UCSC Digital Library Collection:</title>
  <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3894" />
  <subtitle />
  <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3894</id>
  <updated>2026-04-30T22:37:21Z</updated>
  <dc:date>2026-04-30T22:37:21Z</dc:date>
  <entry>
    <title>Enhancing the Onion Name System for Darknet</title>
    <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3940" />
    <author>
      <name>Maduranga, G. A. A.</name>
    </author>
    <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3940</id>
    <updated>2018-08-20T09:06:22Z</updated>
    <published>2017-01-01T00:00:00Z</published>
    <summary type="text">Title: Enhancing the Onion Name System for Darknet
Authors: Maduranga, G. A. A.
Abstract: Abstract&#xD;
The surface net as a whole does not provide the capabilities for an individual to share all kinds of information without having to take responsibility for the content posted by the individual. In a place where surface net fails, darknet prospers. Individuals with the need to share information with plausible deniability use darknet to achieve this end of the goal. However, the usability issues of the darknet act as a continuous hindrance to the use and growth of darknet. Thus, there is a requirement for a secure, decentralized name system for darknet, to overcome the above issue.&#xD;
In this document, the Onion Name System (OnioNS) is considered as a possible candidate to overcome the above-mentioned issues. Primarily the security concerns OnioNS introduces to the Tor network is analysed. Special concern is given to the possibility of time analyses attacks that could be carried out on the Tor network due to restrictions imposed by the OnioNS. The concerns raised are addressed in this dissertation and a method to overcome them is introduced. A novel hash tree data structure is introduced as the core component of the proposed solution. The proposed solution is analysed in order to guarantee that it is capable of implementing all the features of the OnioNS while minimizing the security threats the existing system imposes on Tor network.&#xD;
Further analysis of the novel solution is discussed in order to identify if the solution introduced has implemented any additional vulnerabilities to the Onion Name System or the Tor network.</summary>
    <dc:date>2017-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Framework for Secure Software Engineering: A Knowledge Modeling based Approach for inferring Association between Source Code and Software Design Artifacts</title>
    <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3939" />
    <author>
      <name>Abeyrathna, K.A.I.</name>
    </author>
    <author>
      <name>Dahanayake, B.N.</name>
    </author>
    <author>
      <name>Samarage, C.S.</name>
    </author>
    <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3939</id>
    <updated>2018-08-20T08:39:42Z</updated>
    <published>2017-01-01T00:00:00Z</published>
    <summary type="text">Title: A Framework for Secure Software Engineering: A Knowledge Modeling based Approach for inferring Association between Source Code and Software Design Artifacts
Authors: Abeyrathna, K.A.I.; Dahanayake, B.N.; Samarage, C.S.
Abstract: Abstract&#xD;
The popular approaches in securing software systems are operating system security, anti-virus, and firewalls. These approaches build security around the software system instead of integrating within the software system. However, it is not adequate since the root cause of software vulnerabilities reside within the software system. As a result, current approaches for Software Development have given a major focus on the integration of Security with the development process to develop secure and reliable software systems. Secure Software Engineering process integrates security in each phase of the software development lifecycle. A disconnected set of security-specific practices and tools are available to be used in each phase. Architecture-level security flaws arise in the design phase while security specific bugs are caused in the implementation level. Whenever a security issue in one phase is not resolved, it can be propagated to security ramifications in another phase. The unresolved architecture-level security flaws will create security bugs at the implementation level. A connectivity between the security bugs and architecture-level security flaws needs to be identified to solve the root cause of the security bug arise as a ramification.&#xD;
This dissertation proposes a semi-automated approach to infer the association between security bugs and architecture-level security flaws by implementing a framework named Conexus as a proof of concept. The proposing approach uses static code analysis to identify the security bugs with respect to OWASP Top 10 vulnerability types and threat modeling to identify the architecture-level security flaws with respect to STRIDE threat categorization model. The identified security bugs and architecture-level security flaws are used as the input to the Conexus framework and the association between the two categories is derived using a Knowledge modeling based mechanism. The security controls violated by each STRIDE threat category and OWASP Top 10 vulnerability type are used in the Knowledge Base to identify the association between threat categories and bug categories through a semantic similarity matching model. Depending on the results generated from the Conexus framework, a software developer can revise the design to make a secure design followed by a secure code to eliminate and reduce security vulnerabilities in a software application.</summary>
    <dc:date>2017-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Sound Processing Pipeline for Robust Feature Extraction to Detect Elephant Rumbles</title>
    <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3938" />
    <author>
      <name>Silva, M. B. C. K.</name>
    </author>
    <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3938</id>
    <updated>2018-08-20T08:31:59Z</updated>
    <published>2017-01-01T00:00:00Z</published>
    <summary type="text">Title: A Sound Processing Pipeline for Robust Feature Extraction to Detect Elephant Rumbles
Authors: Silva, M. B. C. K.
Abstract: Abstract&#xD;
A signi cant number of human and elephant lives have been lost due to the humanelephant&#xD;
con&#xD;
ict in Sri Lanka. To save lives of humans and elephants, it is therefore essential&#xD;
to minimize encounters between them. An early warning system, which detects and localize&#xD;
the presence of elephants through their infrasonic emissions is a viable solution to mitigate&#xD;
such con&#xD;
icts. The high cost of infrasonic detectors is an important challenge to the realworld&#xD;
deployment of such localization systems, in particular in developing countries where&#xD;
the human-elephant con&#xD;
ict occurs. ElOC is a system developed as a part of inventing a lowcost&#xD;
automatic elephant detection and localization system. Which is capable of localizing&#xD;
the infrasonic source within a ten-meter accuracy.&#xD;
In this dissertation, a novel approach is proposed to extend the ELOC to identify the&#xD;
elephant infrasound automatically. The novelty of this approach is the capability of distinguishing&#xD;
the infrasonic emissions from the elephant on top of the low-cost, resource-limited&#xD;
hardware platform of the ELOC. The approach  rst applies a sequence of operations to&#xD;
reduce the e ect of noise contained in the infrasonic signal captured by the ELOC node.&#xD;
Then the spectral features of the infrasonic signal are extracted with wavelet-based signal&#xD;
reconstruction to analyze the signal more precisely. Finally, the extracted features are feed&#xD;
to the pre-trained classi er to distinguish the infrasound emissions from the elephants.&#xD;
This study is able to classify elephant rumbles with an accuracy of 82%. Thereby the&#xD;
proposed approach exhibits promising results in elephant detection and capable of operating&#xD;
on the resource-limited hardware platform of the ELOC. This study also contributes to the&#xD;
domain of digital signal processing since the study is the  rst attempt of wavelet-based&#xD;
feature extraction in the domain of infrasound elephant rumble detection.</summary>
    <dc:date>2017-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Reinforcement Learning Approach to Determine Horizontal Spaces in Typefaces</title>
    <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3937" />
    <author>
      <name>Ranathunga, N.M</name>
    </author>
    <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3937</id>
    <updated>2018-08-20T08:11:39Z</updated>
    <published>2017-01-01T00:00:00Z</published>
    <summary type="text">Title: A Reinforcement Learning Approach to Determine Horizontal Spaces in Typefaces
Authors: Ranathunga, N.M
Abstract: Abstract&#xD;
Typeface spacing is a hard problem. It takes countless hours of manual labour to achieve&#xD;
an aesthetically pleasing font, one frequently encounters in digital media. The amount of&#xD;
space between two letters (inter-letter space) significantly contributes to the aesthetically&#xD;
pleasing nature and readability of the typeface. Although inter-letter spacing defines the&#xD;
texture and feel of a typeface and when done accurately yields aesthetically balanced, and&#xD;
an appealing typeface. Setting spacing in a typeface is a tedious and time-consuming task.&#xD;
Hence this research presents an exploratory study investigating potential of reinforcement&#xD;
learning models to fully automate the typeface spacing process.&#xD;
The proposed reinforcement learning model, first of it’s kind was able to achieve good&#xD;
accuracies even with a simple reward function. Some of the visual differences were subtle.&#xD;
Thus, we conclude that reinforcement learning models can indeed be used to model the&#xD;
typeface spacing problem and as one of the first attempts to apply reinforcement learning&#xD;
models in this particular problem domain, this study lays the foundation to future research&#xD;
and studies.</summary>
    <dc:date>2017-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

