<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4749">
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4749</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4803" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4802" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4801" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4800" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-30T03:11:11Z</dc:date>
  </channel>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4803">
    <title>Enhancing Creditworthiness in Peer-to-Peer Lending Using Human Centered Artificial Intelligence</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4803</link>
    <description>Title: Enhancing Creditworthiness in Peer-to-Peer Lending Using Human Centered Artificial Intelligence
Authors: Wijetunga, W. L. P. M
Abstract: Abstract&#xD;
This research addresses significant gaps in the Peer-to-Peer (P2P) lending field, specifically the&#xD;
lack of transparency, effectiveness, human biases and fairness and high false positive rates. To&#xD;
tackle these issues, design science approach and research onion methodology are utilized with&#xD;
data from the Lending Club P2P lending company. The aim of this research is to make the process&#xD;
of creditworthiness in peer-to-peer lending more effective through the application of Human&#xD;
Centered AI. This involves identifying the most accurate Machine Learning (ML) model, determining&#xD;
the most interpretable eXplainable Artificial Intelligence (XAI) model, integrating both&#xD;
models and evaluating their effectiveness in P2P lending with a focus on interpretability and explainability.&#xD;
The Random Forest classifier is found to be the most accurate ML model compared&#xD;
to XGBoost, LLR and Classification Tree. XAI models such as SHAP, LIME and DiCE provide&#xD;
valuable insights into interpretability. SHAP offers global and local interpretations while LIME&#xD;
focuses on localized explanations. DiCE generates counterfactuals for "what-if" scenarios which&#xD;
help determine necessary changes to loan features. Evaluation includes quantitative metrics&#xD;
such as Accuracy, F1 score and AUC-ROC from ML models as well as qualitative components&#xD;
such as interviews and questionnaires to assess the combined ML and XAI model’s effectiveness.&#xD;
The successful integration of an accurate ML model (Random Forest) with state-of-the-art XAI&#xD;
methods contributes to transparent and efficient creditworthiness assessment in P2P lending.&#xD;
Further research should focus on enhancing the ML and XAI framework through longitudinal&#xD;
studies exploring additional XAI methods across multiple P2P lending platforms. This research&#xD;
sets the foundation for future investigations that will advance the integration of ML and XAI&#xD;
in P2P lending while opening avenues for further improvement in creditworthiness assessment&#xD;
methodologies.</description>
    <dc:date>2024-05-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4802">
    <title>Malicious Network Activity Detection through Electromagnetic Radiation in Wired Ethernet</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4802</link>
    <description>Title: Malicious Network Activity Detection through Electromagnetic Radiation in Wired Ethernet
Authors: Weerasinghe, B.S
Abstract: Abstract&#xD;
Traditional network security measures, while effective in fortifying network infrastructure,&#xD;
face limitations in scenarios where physical interception of network traffic is&#xD;
unfeasible, such as in network forensics investigations or within resource-constrained&#xD;
Internet of Things (IoT) environments. This necessitates the development of noninvasive&#xD;
detection techniques capable of discerning malicious network activities without&#xD;
imposing undue burdens on network resources.&#xD;
In recent years, exploration into Electromagnetic Radiation (EMR) analysis has&#xD;
emerged as a promising avenue for non-invasive monitoring and analysis of network&#xD;
traffic. This research investigates the viability of employing Electromagnetic (EM)&#xD;
side-channel analysis (SCA) to detect malicious network activities in wired Ethernet&#xD;
environments.&#xD;
A hardware setup was devised to simulate an attacker and a victim connected via&#xD;
a Cat 6 cable. Three types of Denial of Service (DoS) attacks (DoS HTTP, DoS TCP,&#xD;
DoS UDP) were simulated across the cable, and respective EM traces were captured.&#xD;
Additionally, benign traffic traces were collected during periods of no intentional&#xD;
communication between the two devices. An H-loop antenna connected to a HackRF&#xD;
One software-defined radio (SDR) device was utilized for data collection.&#xD;
These traces were divided into training and testing datasets, with the training&#xD;
set used to train three models: Random Forest Classifier (RFC) with AdaBoost,&#xD;
Multilayer Perceptron (MLP), and Support Vector Machine (SVM). Subsequently,&#xD;
the model was applied to the testing set, achieving a classification accuracy of 99.70%&#xD;
for distinguishing between normal and malicious traces. These findings demonstrate&#xD;
the feasibility of detecting malicious network-based attacks in a non-invasive manner&#xD;
with sufficient reliability.</description>
    <dc:date>2024-05-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4801">
    <title>Estimating Story Points in Scrum: Balancing Accuracy and Interpretability with Explainable AI</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4801</link>
    <description>Title: Estimating Story Points in Scrum: Balancing Accuracy and Interpretability with Explainable AI
Authors: Walpita Gamage, I.N
Abstract: Abstract&#xD;
This study addresses the challenge of accurate Story Points (SP) estimation in agile&#xD;
software development. SP, a unit for measuring development effort, are crucial&#xD;
for project planning and resource allocation. However, manual SP estimation is&#xD;
critical yet a tedious and error-prone process, often causing delays and exceeding&#xD;
project budgets. This highlights the pressing need for automated and accurate SP&#xD;
prediction in the software development industry.&#xD;
This study addresses this need by proposing a novel data preprocessing approach for&#xD;
story point estimation. It involves removing similar user stories, data augmentation&#xD;
and description segmentation. Furthermore, the study contributes 3 new datasets&#xD;
to the public domain specifically designed for story point estimation research. This&#xD;
enhanced data richness and diversity are shown to significantly improve model performance.&#xD;
The study leverages these 3 datasets and the Choetkiertikul dataset to&#xD;
train various traditional and transformer models, including Support Vector Machines&#xD;
(SVM), Random Forest, Recurrent Neural Network (RNN), Bidirectional&#xD;
Encoder Representations from Transformers (BERT), DistilBERT and RoBERTa.&#xD;
Among the traditional approaches, SVM achieved the highest accuracy (46.12%).&#xD;
BERT outperformed other transformer models (44.58%) but fell slightly short of&#xD;
SVM’s performance.&#xD;
To enhance model transparency and interpretability, the study employed Local Interpretable&#xD;
Model-agnostic Explanations (LIME), Shapley Additive explanations&#xD;
(SHAP), and Transformer Interpret libraries. These techniques offer explanations&#xD;
by highlighting keywords influential in the model’s predictions. Additionally, a&#xD;
human-based evaluation involving 7 industry professionals was conducted to assess&#xD;
both model performance and the reliability of the Explainable Artificial Intelligence&#xD;
(XAI) methods.</description>
    <dc:date>2024-05-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4800">
    <title>Consensus-Based Cooperative Location Proof for Untrusted Devices</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4800</link>
    <description>Title: Consensus-Based Cooperative Location Proof for Untrusted Devices
Authors: Vishwajith, K.K.W
Abstract: Abstract&#xD;
Modern Location-based Services depend on the user’s honesty to provide the benefits.&#xD;
Since the location is determined mainly using the user devices, adversarial actors abuse&#xD;
these services for their intent. To address this problem we propose a location-proof&#xD;
method that’ll help Location-based Services to serve genuine users of the service positioned&#xD;
in a particular position at a given time. The proposed solution verifies user location&#xD;
by nearby communication method giving proofs of location tied to a boundary provided&#xD;
by the transmission channel. With the range of 30 meters to 50 meters per location-proof,&#xD;
We also address the issues created by having this kind of location method like privacy and&#xD;
security. Verified by Automated Validation of Internet Security Protocols and Applications&#xD;
(AVISPA), we prove that attacks on the protocol can be easily mitigated. We show&#xD;
that the proposed solution is cost-effective since it does not need additional infrastructure&#xD;
and modification to the hardware.</description>
    <dc:date>2024-05-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

