<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>UCSC Digital Library Community:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4117</link>
    <description />
    <pubDate>Thu, 26 Mar 2026 11:08:41 GMT</pubDate>
    <dc:date>2026-03-26T11:08:41Z</dc:date>
    <item>
      <title>Investigating the Effect of Different Subflow MTUs on MPTCP Throughput</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4946</link>
      <description>Title: Investigating the Effect of Different Subflow MTUs on MPTCP Throughput
Authors: Manoratne, C.S.
Abstract: Abstract&#xD;
Multipath TCP (MPTCP) is an extension of the traditional Transmission Control&#xD;
Protocol (TCP) that enables simultaneous use of multiple network paths&#xD;
between two endpoints, offering improved resilience, throughput, and resource&#xD;
utilization. While existing MPTCP implementations perform well in homogeneous&#xD;
environments, their behavior in heterogeneous networks, particularly when&#xD;
subflows have different Path Maximum Transmission Units (MTUs) remains underexplored.&#xD;
This research investigates the impact of varying subflow MTUs on&#xD;
MPTCP throughput using a controlled emulation environment. Experimental&#xD;
analysis reveals that the default Linux MPTCP implementation fails to utilize subflows&#xD;
with smaller MTUs effectively, primarily due to limitations in the Path MTU&#xD;
Discovery (PMTUD) mechanism and a unified Maximum Segment Size (MSS) approach.&#xD;
Kernel-level modifications were introduced to enable MTU probing on a&#xD;
per-subflow basis, allowing dynamic MSS adjustment and improved subflow utilization.&#xD;
Results demonstrate a notable improvement in throughput and path&#xD;
diversity post-modification, highlighting the importance of MTU-aware scheduling&#xD;
and adaptive probing techniques. The findings suggest potential directions for&#xD;
enhancing MPTCP performance in heterogeneous environments and contribute to&#xD;
the ongoing development of more robust multipath communication protocols.</description>
      <pubDate>Fri, 25 Apr 2025 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4946</guid>
      <dc:date>2025-04-25T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Applicability of Transfer Learning on Sinhala Named-Entity Recognition</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4945</link>
      <description>Title: Applicability of Transfer Learning on Sinhala Named-Entity Recognition
Authors: Abeynayaka, A.G.K.C
Abstract: ABSTRACT&#xD;
Named Entity Recognition (NER) is a preliminary task in Natural Language&#xD;
Processing. NER has evolved from relying on rule-based mechanisms to utilizing&#xD;
neural networks. NER is a pretty much resolved matter in the English language.&#xD;
The Sinhala language faces the issue of data scarcity due to its complexities with&#xD;
dataset extraction. Manual annotation of a Sinhala-labeled dataset is a laborious&#xD;
task.&#xD;
Entity recognition solely depends on a tagged dataset in a specific language,&#xD;
but due to data limitations, it’s hard to do experiments on NER models in Sinhala.&#xD;
However, most of low-resource NLP researches shows remarkable improvement&#xD;
with the knowledge transferring mechanism, which is known as transfer&#xD;
learning. This research suggests a Sinhala NER model based on transfer learning,&#xD;
considering monolingual and multilingual approaches. An Indic language&#xD;
model is fine-tuned for the target Sinhala NER model during both approaches.&#xD;
The IndicBERT(Kakwani et al. 2020) model is chosen as the source model due&#xD;
to its similarity with Sinhala.&#xD;
The evaluations were done on monolingual and multilingual datasets. For the&#xD;
monolingual dataset, a separate dataset was created using a weakly supervised&#xD;
automatic method that contains six different categories. The multilingual dataset&#xD;
was created with a Bengali dataset. The final transfer learning model was trained&#xD;
on hyperparameter tuning followed by an augmented dataset from monolingual&#xD;
data. It showed a moderate precision of 48.21%. The baseline CRF model showed&#xD;
a macro precision of 90% and a macro F1-score of 61% showing that CRF is&#xD;
applicable in normal contexts.</description>
      <pubDate>Mon, 28 Apr 2025 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4945</guid>
      <dc:date>2025-04-28T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Real-Time 3D Avatar Modeling for AR using Human Pose and Actions in Resource-Constrained Web Environments</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4944</link>
      <description>Title: Real-Time 3D Avatar Modeling for AR using Human Pose and Actions in Resource-Constrained Web Environments
Authors: Galappaththy, S.R.
Abstract: Abstract&#xD;
Real-time 3D avatar animation using standard webcams offers immense&#xD;
potential for immersive communication and interaction within web-based&#xD;
Augmented Reality (AR). However, existing solutions often struggle with&#xD;
accessibility and generalisation, either requiring specialised hardware or&#xD;
relying on a single, high-fidelity pose estimation input that may be too&#xD;
resource-intensive for many web environments. This creates a significant&#xD;
gap, as these systems cannot easily adapt to the diverse quality and format&#xD;
of data from various readily available pose estimators or gracefully handle&#xD;
common real-world challenges like partial user visibility.&#xD;
This research addresses these limitations by employing a Design Science&#xD;
Research methodology to design, implement, and evaluate a novel, generalized&#xD;
middleware pipeline for real-time, webcam-based 3D avatar animation,&#xD;
operating entirely within standard web browsers. The core contribution is a&#xD;
modular JavaScript-based architecture centered around a biomechanicallyaware&#xD;
canonical pose representation aligned with the VRM humanoid standard.&#xD;
The methodology involves developing an adaptive input adapter for&#xD;
heterogeneous data (from MoveNet, BlazePose, YOLO-Pose, etc.), a pose&#xD;
processor for heuristic 2D-to-3D lifting and robust inference of occluded&#xD;
joints using data-driven priors from H36M, and a flexible retargeting module.&#xD;
Experimental results demonstrate the pipeline’s ability to successfully&#xD;
process diverse inputs and drive plausible, full-body avatar animations in&#xD;
real-time. Notably, the system generates coherent motion even from sparse&#xD;
2D keypoint data where simpler direct mapping would fail. Performance&#xD;
analysis indicates viability on desktop/laptop browsers and feasibility on&#xD;
mobile devices with lighter-weight estimators. This research presents a significant&#xD;
step towards more accessible and flexible real-time avatar systems&#xD;
for the web platform, providing a practical and extensible foundation for&#xD;
future advancements in web-based embodied interaction.</description>
      <pubDate>Mon, 30 Jun 2025 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4944</guid>
      <dc:date>2025-06-30T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Investigating Linux Random Number Generator for Virtualization Detection from the Non Privileged User Space</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4943</link>
      <description>Title: Investigating Linux Random Number Generator for Virtualization Detection from the Non Privileged User Space
Authors: Harshani, A. A. D.
Abstract: Abstract&#xD;
The detection of virtualization presence is a critical problem in malware analysis, where&#xD;
malicious software may attempt to identify if it is being tested within a virtual environment.&#xD;
Existing methods often require special privileges, creating a gap for non privileged&#xD;
approaches. This study investigates the feasibility of detecting virtualization presence&#xD;
from the non privileged user space by analyzing the behaviour of the Linux Random&#xD;
Number Generator (LRNG), a component not previously used for this purpose.&#xD;
A series of experiments were conducted across bare metal and virtual environments&#xD;
under varying impact levels to assess differences in random number generation rates and&#xD;
quality. The evaluation included both single and multiple VM setups, across desktop,&#xD;
private, and public cloud infrastructures. Results revealed measurable distinctions in&#xD;
LRNG behaviour between bare metal and virtual environments through distinct timing&#xD;
distributions, where early peaks were observed. These early peaks refer to instances where&#xD;
random number generation took significantly longer in virtual environments in the beginning&#xD;
compared to bare metal systems. Additionally, differences in dispersion patterns&#xD;
across bare metal and virtual environments were identified, which were collectively used&#xD;
for the detection of virtualization environments through derived thresholds, achieving a&#xD;
detection accuracy of up to 94.44%.&#xD;
The study also examined the role of entropy enhancing tools designed to improve&#xD;
the randomness of generated data, in obscuring virtualization presence. The results&#xD;
proved approach is ineffective, suggesting the need for further research into obscure such&#xD;
detection. The influence of the operating system on LRNG behaviour was identified as a&#xD;
significant factor, with notable differences observed between Debian and Red Hat based&#xD;
Linux systems.&#xD;
These findings demonstrate the potential of LRNG characteristics for non privileged&#xD;
virtualization detection with a novel direction. Unlike traditional detection methods that&#xD;
rely on privileged access, this approach operates entirely from the user space, demonstrating&#xD;
the feasibility of using user space behaviours to address virtualization detection challenges&#xD;
and opening possibilities for further research in this domain. Future work should&#xD;
focus on extending the scope of these findings, addressing the limitations identified, and&#xD;
exploring additional methods to enhance the robustness of detection and obfuscation&#xD;
techniques.</description>
      <pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4943</guid>
      <dc:date>2025-06-26T00:00:00Z</dc:date>
    </item>
  </channel>
</rss>

