<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4147">
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4147</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4364" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4363" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4362" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4252" />
      </rdf:Seq>
    </items>
    <dc:date>2026-03-26T15:13:24Z</dc:date>
  </channel>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4364">
    <title>Remote management framework for IoT devices utilizing Blockchain</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4364</link>
    <description>Title: Remote management framework for IoT devices utilizing Blockchain
Authors: Deshapriya, R.S
Abstract: In recent times, the Internet of Things has become a major driving force in the development of&#xD;
a connected world. Potentially millions of devices featuring sensors and actuators would form&#xD;
a complete, cohesive network of things that would generate billions of bits of data. There are&#xD;
many issues related to the management and security of IoT devices, posing risks and difficulties&#xD;
in authentication, and remote management of devices belonging to a single owner.&#xD;
Blockchain has become popular with the rise of cryptocurrencies as a distributed, peer-to-peer&#xD;
ledger. With its features of verification, security and immutability, it has also become highly&#xD;
useful in areas other than cryptocurrency as a secure storage mechanism which is immune to&#xD;
attacks. As such, the possibility of implementing private blockchains which fulfill use cases related to secure storage, nonrepudiation and maintenance of reliable records has been explored.&#xD;
This research was targeted at bringing the security of blockchain as a viable means to manage&#xD;
and maintain details of IoT devices including their credentials, as well as the enablement of remote management of multiple devices belonging to a single owner. The implementation focuses&#xD;
on two main flows: the creation and management of devices and the storage of messages on&#xD;
blockchain.&#xD;
There are three main components of the developed system, the backend application which&#xD;
consists of a generic MQTT message broker and a RESTful web service API, the blockchain&#xD;
component which is implemented using Hyperledger Fabric, and an AngularJS web application&#xD;
which provides a standard interface for the user. The backend application impelements chaincode to interface with the blockchain to form smart contracts on the creation of device details&#xD;
and device message details on the ledger in the form of transactions.&#xD;
Evaluation of the system was carried out through the implementation of Behaviour-Driven&#xD;
Development-based testing methodologies, and have conclusively proven that blockchain can be&#xD;
utilized as a secure storage mechanism for maintaining IoT device details.</description>
    <dc:date>2021-08-03T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4363">
    <title>Free hand interaction therapy for Parkinson’s disease using leap motion</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4363</link>
    <description>Title: Free hand interaction therapy for Parkinson’s disease using leap motion
Authors: Wijethunga, I.A.
Abstract: This project is based on developing a system for Parkinson’s disease patients to give them&#xD;
free hand interaction therapies using the leap motion controller. Increasing demand for health&#xD;
applications for the more helpless people like Parkinson’s patients has led to develop an&#xD;
important system of this nature. Primary signs of Parkinson’s disease include tremor of&#xD;
hands, arms, legs, jaw and face. Physical therapies and exercise programs are recommended in&#xD;
people with Parkinson's disease to control the disease and to give them a better life. Rehabilitation&#xD;
methods using serious game without any device attached to the body is proposed for&#xD;
Parkinson's patients with limited mobility in order to restore their ability to independently&#xD;
perform the basic activities of daily living or to recover a lost or diminished function by&#xD;
performing exercises on a regular basis.&#xD;
Leap Motion is an optical sensor specially designed for acquisition of 3D positions and&#xD;
orientations of hands and fingers. The main purpose of the sensor was to extend current input&#xD;
devices with 3D control for VR environments. The Leap Motion Controller is capable of&#xD;
detecting and tracking hands, fingers, and tools in its field of view. The device captures data&#xD;
one frame at a time and the rate at which this occurs, or frame-rate, can vary based on the&#xD;
lighting conditions, but typically occurs at approximately 100 frames per second (fps). The&#xD;
device is capable of recording the three dimensional fingertip positions, which is done in&#xD;
millimeters relative to the device’s origin. The Leap Motion Controller follows a righthanded Cartesian coordinate system, with the origin centered at the top and middle of the&#xD;
Leap Motion Controller&#xD;
In this project, the Leap Motion sensor is used to give hand and finger therapies for&#xD;
Parkinson's patients using serious game application developed using three js. The scope of&#xD;
this project is to track the motion of the fingers of the hand and to exercise the fingers of the&#xD;
hand. Further to track the progress of the patient by giving an analysis of the output. Each&#xD;
patient should use a separate login and it will help to keep the records and analyze to monitor&#xD;
the progression of the Parkinson’s patient.</description>
    <dc:date>2021-08-03T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4362">
    <title>Bug Prediction Model Using Code Smells</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4362</link>
    <description>Title: Bug Prediction Model Using Code Smells
Authors: Ubayawardana, D.L.G.M.
Abstract: The term ‘Code Smells’ was first coined in the book by Folwer [1]. A code smell is a surface indication that usually corresponds to a deeper problem in the system. These poor design choices&#xD;
have the potential to cause an error or failure in a computer program. The objective of this study&#xD;
is to use ‘Code Smells’ as a candidate metric to build a bug prediction model.&#xD;
Bug prediction models are often very useful. When bugs of a software can be predicted, the&#xD;
quality assurance teams can identify error prone components in advance and effectively allocate&#xD;
more resources to validate those components thoroughly.&#xD;
Bug prediction is an active research area in the community and various bug prediction models have been proposed using different metrics such as source code, process, network and code&#xD;
smells etc.&#xD;
In this study we have built a bug prediction model using both source code metrics and code smell&#xD;
based metrics proposed in the literature. We cannot use code smell based metrics only as a single predictor to predict buggy components of a software. There can be files in the source code&#xD;
which do not contain code smells. Therefore we will not be able to predict bug proneness of such&#xD;
components if we use code smell based metrics only. Therefore we initially built a basic model&#xD;
using source code metrics and then enhanced the basic model by using code smell based metrics.&#xD;
We used Naive Bayes, Random Forest and Logistic Regression as our candidate algorithms to&#xD;
build the model. We have trained our model against multiple versions of thirteen different Java&#xD;
based open source projects. The trained model was used to predict bugs in a particular version&#xD;
of a project and a particular project. We have also trained our model among different projects&#xD;
and trained model was used to predict bugs in an entirely different project.&#xD;
We were able to demonstrate in this study, that code smell based metrics can significantly improve the accuracy of a bug prediction model when integrated with source code metrics. Random Forest algorithm based model showed higher accuracy within a version, within a project&#xD;
and among projects when compared to other algorithms.</description>
    <dc:date>2021-08-03T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4252">
    <title>Anomalies Detection System for Stock Market</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4252</link>
    <description>Title: Anomalies Detection System for Stock Market
Authors: Sumanaweera, U. A. U.
Abstract: Stock market is the place to trade company stocks among market participants at an agreed&#xD;
price. Investors have to have a good knowledge about fluctuations of parameters of market and&#xD;
there is a possibility of novel investors get in trouble due to lack of awareness of fluctuations in&#xD;
market.&#xD;
Rule based patterns are widely used in practice in the existing manipulation detection methods. However manipulators constantly change their strategies and they find new ways to manipulate markets. Therefore rule based or static detection methods fail to detect these new evolving&#xD;
manipulation attempts.&#xD;
The main project objective is to research and implement a method to detect these evolving&#xD;
stock abusing patterns. Artificial immune system theories based on stock manipulation detection system is implemented as an advanced detection mechanism. This project approaches&#xD;
the problem by analyzing daily price,volume values of transactions along with the behavior of&#xD;
customer. Natural immune system techniques are used such as danger theory, negative selection, clonal selection and immune network theory which have approach to identify unknown&#xD;
signatures of anomalies in stock market transactions.&#xD;
Novelty of this research is having a learning phase to train the system along with the usage&#xD;
of Artificial Immune System theories. Previous work does not have a learning phase based on&#xD;
AIS theories in detecting stock market anomalies. Unlike simple statical evaluations, system&#xD;
is capable of identifying stock market anomalies in a better rate due to supervised learning&#xD;
techniques.&#xD;
System was tested based on real transaction data collected from Saudi Stock Exchange. First&#xD;
stage is supervised learning for price, volume anomaly detection and second stage is optimize&#xD;
results using customer behavior. More than 30,000 real transactions are used for testing in&#xD;
various models. Degree of anomaly of a transactions is marked based on conclusions of three&#xD;
domain experts and system output is evaluated based on them. Best System output was 96%&#xD;
of Precision, 100% of recall, 75% of Accuracy and 88% of F1 score. All the percentages are&#xD;
calculated with respect to conclusions of domain experts.</description>
    <dc:date>2021-07-27T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

