<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4145">
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4145</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4266" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4265" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4264" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4263" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-26T20:08:44Z</dc:date>
  </channel>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4266">
    <title>Automated near real-time Cheque Clearing System with Digital Cheque</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4266</link>
    <description>Title: Automated near real-time Cheque Clearing System with Digital Cheque
Authors: Weerasinghe, A.
Abstract: Cheque is the most demanded non-cash retail payment instrument in Sri Lanka, which is&#xD;
accounted for more than 90% of total non-cash retail payment transaction.&#xD;
Total value cheques cleared per day is gradually increasing and it has been surpassed more&#xD;
than 20billion per day. These volumes suggest the continual importance of cheques in Sri&#xD;
Lankan Economy.&#xD;
Various modes of digital payments are taking the space of this well mature payment mode&#xD;
due to its few weaknesses, such as time to realize a check, signature validation and logistics.&#xD;
To overcome such weaknesses, this research proposes a secure near real time cheque&#xD;
realization process based on blockchain technology. Ethereum platform has been chosen to&#xD;
demonstrate the proof of concept due to its ability to run the programming code of any&#xD;
decentralized application on blockchain technology.&#xD;
Signature validation of paper cheques are getting more and more difficult due to increasing&#xD;
cheque volumes. To properly validate the signatures, it is required to keep many factors to be&#xD;
accurate in cheque imaging. Signature forgery also is not easy to detect in this manual or&#xD;
semi-automatic process and leading many financial loses. To overcome these issues and&#xD;
instantly validate authenticity of cheques, digital signature and data encryption is used&#xD;
coming with blockchain technology. So entirely electronic based cheques, digital signature&#xD;
verification is instant and delivering cheques to the end recipient can have many different&#xD;
logistical modes.</description>
    <dc:date>2021-07-28T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4265">
    <title>Extending File Permission Granularity for Linux</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4265</link>
    <description>Title: Extending File Permission Granularity for Linux
Authors: Wanigasinghe, P. M.
Abstract: In the recent years, threats against intellectual properties, unauthorized information&#xD;
disclosures and data breaches have been raised high. Most of the above attacks initiated&#xD;
within the network, with the help of internal employees. Whether intentionally malicious&#xD;
or unintentionally hazardous, are by far the greater problem in online security. Therefore&#xD;
for system administrators and authorize parties, another level of security definition is&#xD;
needed to secure important files and documents while continuing business as it was.&#xD;
In Linux, traditional file system uses READ, WRITE and EXECUTE permissions&#xD;
over individual users and groups in order to control the file access and file operations.&#xD;
Although this has been the de-facto methodology, it has some disadvantages when it&#xD;
comes to highly secure and sensitive environments like banks and military. There is no&#xD;
straight forward way of defining permissions in operational aspect.&#xD;
The goal of this project is to increase the granularity levels of defining permissions of&#xD;
the Linux file system going beyond traditional read, write and execute permissions. It&#xD;
consists of mainly two modules. In meta header module, authorized user can define what,&#xD;
who and how things are accessible related to files. He can define on what operations needs&#xD;
to restrict on what devices, locations and domains. The other module is responsible for&#xD;
handling the file operations and restrict according to the defined permissions.&#xD;
Evaluation carried out on security, performance and usability aspects. There may have&#xD;
slight performance impact but it’s negligible compared to the requirements of security.&#xD;
Further, this implementation can extends go beyond ext4 and apply into main kernel&#xD;
development.</description>
    <dc:date>2021-07-28T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4264">
    <title>HCE Solution For Offline Transactions</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4264</link>
    <description>Title: HCE Solution For Offline Transactions
Authors: Punchihewa, D.H.T.
Abstract: Electronic smart card payment are widely used in transport payment systems&#xD;
these days. During last few years most of transport operators have started&#xD;
to introduce smart card payments. Most of the existing systems accept offline transactions. The key feature of smart card payments is storing data in&#xD;
the smart card. Smart card has embedded integrated circuits which can be&#xD;
used to store data securely and to communicate with terminal application via&#xD;
Near-field communication(NFC).&#xD;
The objective of this research is to create a proof of concept(PoC) to replace existing smart cards by Android HCE application. HCE assumes that&#xD;
any data stored on a android device is vulnerable and therefore restricts the&#xD;
storage of sensitive data to host or “cloud” databases. Usually HCE provides&#xD;
more simple and less secure way for payment transaction. So this research&#xD;
focus on increasing the security of the stored data in mobile application and&#xD;
make payments without connecting to back-end services.&#xD;
I have selected Desfire EV1 as smart card to emulate on android device.&#xD;
Desfire EV1 card has complex file structure and security features with compare to other available smart cards. Server system is used to increase the&#xD;
security of emulated virtual card in Android device. HSM simulator is used&#xD;
to store keys and perform crypto operations.&#xD;
We present full design and implementation of the system architecture and&#xD;
security architecture involving with the project. We also provide a comparison of implemented system with the existing smart card solution. Android&#xD;
base terminal was used to simulate this bus ticketing terminal application.&#xD;
This terminal application uses Desfire AV2 SAM to store master keys of the&#xD;
virtual card and perform crypto operations to prepare PICC APDUs.</description>
    <dc:date>2021-07-28T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4263">
    <title>Wi-Fi Tomographic intruder detection security alarm system</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4263</link>
    <description>Title: Wi-Fi Tomographic intruder detection security alarm system
Authors: Muller, D.P.
Abstract: Tomographic Motion Detection (TMD) is a technology that provides complete coverage of an&#xD;
area using radio waves and detects any movement with the ability to be completely hidden&#xD;
from view as it is not a line of sight technology, using signals that penetrate through objects.&#xD;
The monitored area is surrounded by nodes that communicates with each other and detects&#xD;
movements by the disturbance to the Receive Signal Strength (RSS) of each node measured&#xD;
by a processing and controlling unit.&#xD;
2.4 GHz signals are heavily attenuated by anything containing water such as the human body.&#xD;
Hence using Wi-Fi (Wireless Fidelity) signals which operate in the 2.4 GHz band, it is&#xD;
possible to identify the significant disturbances in the Receive Signal Strength Indicator&#xD;
(RSSI) and identify human movements without carrying additional transmitting devices.&#xD;
Today, protecting our valuable assets, confidential data, human life in a better way and&#xD;
avoiding unauthorised physical access to devices, in the field of Information Security, are&#xD;
demands in need. This is an eye opener for the use of TMD when compared with the&#xD;
limitations with commonly used Passive Infrared (PIR) motion detectors.&#xD;
This research is an attempt to use non-overlapping Wi-Fi channels, simultaneously to generate&#xD;
better TMD for human detection within the Wi-Fi frequency range.&#xD;
Initially, as the required hardware to capture the RSSI, ESP 8266, embedded Wi-Fi modules&#xD;
controlled by Arduino, connected to a computer via Universal Serial Bus (USB) were setup.&#xD;
The Wi-Fi modules can be configured for the required Wi-Fi channel, transmitting or&#xD;
receiving mode and capable of more configurations.&#xD;
Arduino, Integrated Development Environment (IDE) which is open source and MS Comm&#xD;
Control a freeware control are used for developing, uploading the developed programs into&#xD;
the Wi-Fi module microcontrollers and reading RSSI using a computer.&#xD;
Thereafter, identified the significant difference in the RSSI measured for humans, compared&#xD;
with other objects. For the analysis, data from RSSI readings were gathered in several tests&#xD;
placing objects and humans in between the Wi-Fi transmitters and receivers in a straight line&#xD;
obstructing the signals from the transmitters and graphs were generated.&#xD;
Finally, determined how accurately a human movement can be detected, using a probability&#xD;
based approach. Monitored the Wi-Fi, RSSI, with statistical calculations, detected an intruder&#xD;
entering into the defined boundaries and triggered an alarm, constructing a security alarm.</description>
    <dc:date>2021-07-28T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

