<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4143">
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4143</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4254" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4253" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4230" />
      </rdf:Seq>
    </items>
    <dc:date>2026-03-29T06:14:34Z</dc:date>
  </channel>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4254">
    <title>Generate Navigations to Guide and Automate Endotracheal Intubation Process</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4254</link>
    <description>Title: Generate Navigations to Guide and Automate Endotracheal Intubation Process
Authors: Wanigasekara, R.M.R.; Siyambalapitiya, S.D.M.H.; Dissanayake, S.D.S.H.
Abstract: In the medical field, Endotracheal Intubation is an emergency procedure that’s&#xD;
performed on people who are unconscious or who cannot breathe on their own. The&#xD;
endotracheal tube which is put through the mouth or nose serves as an open passage&#xD;
through the upper airway. The purpose of Endotracheal Intubation is to permit air to pass&#xD;
freely to and from the lungs to ventilate the lungs.&#xD;
Many complications can occur in the Nasotracheal Intubation process such as&#xD;
bleeding, infections, damages to the voice box (larynx), thyroid gland, vocal cords and&#xD;
windpipe (trachea), or pharynx. To overcome the consequences, we propose a system to&#xD;
guide and automate endotracheal intubation by providing the physician with necessary&#xD;
navigations for moving the intubation tube. This study is a proof of concept to prove that&#xD;
generating navigations using a trained model based on Convolution Neural Network has&#xD;
practical potential.&#xD;
In the proposed system, different anatomical landmarks along the path from nose&#xD;
to carina are identified, captured images are preprocessed and use a Convolution Neural&#xD;
Network based on image classification to predict the class of each anatomical landmark.&#xD;
The proposed system has been trained using the training dataset of 9753 images, and the&#xD;
performance of the system was evaluated using the testing dataset of 2438 images.&#xD;
The results, obtained using the pre-trained model, show that the system correctly&#xD;
classified 2385 out of 2438 (97.8%).</description>
    <dc:date>2021-07-28T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4253">
    <title>Framework for Secure Coding :An algorithmic approach for real-time detection of secure coding guideline violations</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4253</link>
    <description>Title: Framework for Secure Coding :An algorithmic approach for real-time detection of secure coding guideline violations
Authors: Dasanayake, S.L.; Mudalige, A.; Perera, M.L.T.
Abstract: Secure Software Development refers to the process of developing software applications with&#xD;
minimised security vulnerabilities. In the release or maintenance phase of the Software&#xD;
Development Life Cycle(SDLC), fixing specific bugs is very expensive than correcting such issues&#xD;
during the coding or development phase. Therefore it is essential to minimise these software&#xD;
defects within the coding phase itself by adhering to a set of coding best practices that are referred&#xD;
as secure coding guidelines. Following of these guidelines has been a challenging and timeconsuming task due to the lack of knowledge among developers regarding such guidelines and the&#xD;
fact that currently there exists only a manual mechanism of checking these guidelines using a&#xD;
checklist. This dissertation proposes a plugin-based framework for IntelliJ IDEA Integrated&#xD;
Development Environment that focuses on developing a mechanism to automate the process of&#xD;
detecting secure coding guideline violations found in the source code of a software application.&#xD;
The framework is based on the secure coding guidelines introduced by Software Engineering&#xD;
Institute Computer Emergency Response Team (SEI CERT) known as the SEI CERT secure&#xD;
coding rules. These secure coding rules include guidelines for avoiding coding and implementation&#xD;
errors, as well as low-level design errors.&#xD;
In order to implement the secure coding rules, the rules were classified into three granularity levels&#xD;
namely Method, Class and Package level. A total of 15 secure coding rules, five from each&#xD;
granularity level have been implemented in this framework in the form of violation detection&#xD;
algorithms. The source code fragments associated with each violation detection algorithm are&#xD;
obtained via the Abstract Syntax Tree generated by the parser and are stored in data structures such&#xD;
as ArrayLists and HashMaps. Violation detection algorithms use these stored source code&#xD;
fragments to detect secure coding rule violations. A significant feature of this framework is the&#xD;
extensibility mechanism in which violation detection algorithms could be added with minimal&#xD;
effort during future development of the framework. Performance optimisation has also been&#xD;
achieved to minimise resource consumption and reduce latency, by improved system design with&#xD;
the support of software design patterns.&#xD;
Apart from detecting secure coding rule violations in the source code, the framework will also&#xD;
provide the necessary countermeasures to overcome those violations. In addition, the framework&#xD;
could be used as a teaching tool for users who are unaware of the secure coding rules due to its&#xD;
features such as tooltips, tools windows, syntax highlighting. Using this framework, a software&#xD;
developer would be able to adhere to secure coding rules and ensure the security aspect of a&#xD;
software application. The secure coding plugin-based framework has been deployed to the&#xD;
JetBrains plugin repository enabling to be downloaded by the required users.</description>
    <dc:date>2021-07-28T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4230">
    <title>Secure CodeCity A Framework For Security Vulnerability Visualization</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4230</link>
    <description>Title: Secure CodeCity A Framework For Security Vulnerability Visualization
Authors: Abeysinghe, A.A.T.G.; Shalika, M.A.S.; Ahamed, M.S.N.; Mufarrij, S.M.
Abstract: The conventional practice in the software industry towards the resolution of security issues, is to&#xD;
discover those issues during the testing phase of the Software Development Life Cycle and to&#xD;
implement software patches in order to conceal those issues.Such resolutions have resulted in an&#xD;
upsurge of effort and resources,while being unable to eliminate the root symptoms of the security&#xD;
issues. By obliterating the pitfalls of the above approach,an approach which provides a&#xD;
significant focus on integrating Security with each phase of the software development process&#xD;
has been emerged.This approach is named as Secure Software Development Approach, and is&#xD;
known to be leading to the development of more secure and reliable systems.On the other&#xD;
hand,the fundamental idea behind software visualization is to create visual interfaces in order to&#xD;
help developers in understanding different aspects of a source code.Software Visualization has&#xD;
currently become a major topic in the world of research where a large scale effort to find&#xD;
effective software visualization mechanisms, is undertaken by scientific community.Although&#xD;
Secure Software Development and Software Visualization are sturdy approaches inimitably,&#xD;
Secure Software Development does not incorporate intensive software visualization mechanisms&#xD;
such as metaphors in order to manifest the critical information of security issues in software.The&#xD;
purpose of this research is to bridge the aforementioned gap by introducing software&#xD;
visualization to software security.&#xD;
The research was commenced by analyzing the existing visualization models, for the&#xD;
visualization of security issues in a source code. It was discovered that the ‘CodeCity’ model can&#xD;
be well aligned with the purpose of security vulnerability visualization. Therefore ‘CodeCity’&#xD;
was selected as the software visualization approach in visualizing security vulnerability&#xD;
information of a particular source code.The research was conducted based on OWASP security&#xD;
vulnerability categorization and related countermeasures. To embrace the aforementioned&#xD;
purpose, a novel framework named ‘Secure CodeCity’ was proposed.&#xD;
The resulting “Secure CodeCity” visualization focuses on providing a structural overview of the&#xD;
software system, while unveiling security vulnerability information in each levels of the&#xD;
software projects in an attractive and effective manner. This solution proposes several&#xD;
functionalities which will assist programmers in resolving software security issues while&#xD;
following the Secure Software Development approach.</description>
    <dc:date>2021-07-26T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

