<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4141</link>
    <description />
    <pubDate>Thu, 16 Apr 2026 09:52:34 GMT</pubDate>
    <dc:date>2026-04-16T09:52:34Z</dc:date>
    <item>
      <title>Identifying Muscle Imbalances in Athletes via Motion Analysis using Sensory Inputs</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4229</link>
      <description>Title: Identifying Muscle Imbalances in Athletes via Motion Analysis using Sensory Inputs
Authors: Vithanage, S.S.; Ratnadiwakara, M.S.
Abstract: The balance of muscle strength and length between muscles surrounding a joint should be&#xD;
maintained to have a healthy movement and function in human body. Muscle imbalances&#xD;
are mainly caused due to repetitive movement in one direction or sustained posture and the&#xD;
tendency of certain muscle groups to be tight or weak. In the context of collegiate athletes,&#xD;
the healthy practice of movements is essential since the incorrect biomechanics can result&#xD;
in injuries that would take a considerable amount of time to recover through rehabilitation.&#xD;
The current clinical methods of identifying muscle imbalances such as Movement analysis,&#xD;
gait and posture analysis, joint range of motion analysis and muscle length analysis are all&#xD;
observational evaluations that entirely depends on the domain knowledge and experience of&#xD;
the observer. Technical methods such as Electromyography and CT scan require expensive&#xD;
equipment and patients would only care to examine after having pains or dysfunctions.&#xD;
To address the limitations of current muscle imbalance evaluation techniques such&#xD;
as time, cost and domain expertise, this research propose a solution that can incorporate an&#xD;
athlete to self-identify the certain overractive and underractive muscle groups in their body in&#xD;
order to follow intervention exercises. Movement analysis; one of the commonly used methods&#xD;
in the context of physiotherapy to identify dysfunctions in the human musculoskeletal system,&#xD;
is the method used in this research to identify muscle imbalances. The Overhead Squat is&#xD;
used as the movement pattern to be analyzed with the aid of the motion tracking device;&#xD;
Orbbec Astra Pro.&#xD;
Two mathematical models are used to calculate the joint angles and joint distances&#xD;
relating to the overhead squat. The joint positional data taken from Orbbec Astra Pro is&#xD;
used as the input for the mathematical formula. Overhead squat movement pattern of a&#xD;
healthy subject is represented as graphs in order to compare graphs of a new subject to&#xD;
identify deviations. By identifying deviations the research propose potential overractive and&#xD;
underractive muscle groups that causes the muscle imbalances.&#xD;
The accuracy of the proposed method was more than 75%, which is a satisfactory&#xD;
outcome. This method will facilitate the self-detection of imbalances in the whole body at a&#xD;
low-cost and with less time. Further enhancements to this proposed method can bring forth&#xD;
benefits to the fields of sports medicine, physiotherapy as well as physical fitness.</description>
      <pubDate>Mon, 26 Jul 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4229</guid>
      <dc:date>2021-07-26T00:00:00Z</dc:date>
    </item>
    <item>
      <title>The Influence of Community Interactions on User Affinity in Social Networks: A Facebook Case Study</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4228</link>
      <description>Title: The Influence of Community Interactions on User Affinity in Social Networks: A Facebook Case Study
Authors: Senaweera, M.; Chamindi, M.M.N.D.; Dissanayake, S.A.D.Y.R.
Abstract: With the advent of social media, one of the biggest concerns have been its suspected impact&#xD;
on democracy by influencing users’ opinions during elections. Impact of the social networks&#xD;
(and/or media) has been the center of that discussion due to well-known cases of using social&#xD;
networks to sway people’s opinion in events crucial to the democracy such as the election.&#xD;
The accusations vary from the propagation of fake news to concerns about Facebook having&#xD;
unfettered power over its users’ content.&#xD;
As a step towards understanding the true nature of social media’s influence, we started&#xD;
collecting data prior to Local Election in Sri Lanka, 2018 and continued the collection until&#xD;
the election was over; we collected the data through Facebook API and all of the data is&#xD;
completely anonymized. The dataset covers 44K users from Sri Lanka and their interactions&#xD;
with 44 Facebook groups. The dataset also includes all of the associated events related to&#xD;
each group. As a preliminary step, we have analyzed how the user affinity surrounding these&#xD;
groups have changed surrounding the period of the local election. Our analysis also gives a&#xD;
concrete and quantitative evidence of how users are communicating on Facebook and how&#xD;
active they are surrounding a sensitive event.&#xD;
Further, there is a significant change of affinity of a set of individuals over the time&#xD;
corresponding to the external event. Additionally, we find that there are users migrating&#xD;
among the Facebook groups during the election period. Further, we show that when the&#xD;
migration network, viewed as a weighted network, displays features which are significantly&#xD;
different from a comparable random network. In particular, we show that user migrations&#xD;
within Sri Lankan political groups during the election period show a non-random behavior&#xD;
potentially motivated by the real world events.&#xD;
We believe our analysis is the first of its kind in providing scientific analysis of the&#xD;
influence of social media in Sri Lanka.</description>
      <pubDate>Mon, 26 Jul 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4228</guid>
      <dc:date>2021-07-26T00:00:00Z</dc:date>
    </item>
    <item>
      <title>An Enhanced Model for Wildfire Propagation Prediction Using GIS</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4227</link>
      <description>Title: An Enhanced Model for Wildfire Propagation Prediction Using GIS
Authors: Dantanarayana, A. V.; Perera, K. K. C.; Wickramathilaka, B. S.
Abstract: Wildfire modeling and simulation has been one of the major subjects under intense&#xD;
experimental research and theoretical work to address the ever-growing crisis of wildfire. Many&#xD;
researchers have benefitted from these work and have developed multiple wildfire propagation&#xD;
prediction systems for decision support. Despite the large-scale effort undertaken by the scientific&#xD;
community, it can be also observed that these advancements have become limited to the developed&#xD;
countries of the world. This can be attributed to the fact that a reliably accurate wildfire behavior&#xD;
model requires many input variables and acquiring these variables requires a great deal of&#xD;
infrastructure already in place. These infrastructures can be quite costly, making it infeasible for the&#xD;
developing countries to develop a wildfire propagation prediction system. The purpose of this&#xD;
research is to enhance an existing wildfire model in a manner that it requires less infrastructure at an&#xD;
acceptable accuracy level.&#xD;
The study was begun by analyzing the existing models for extensibility and enhanceability.&#xD;
It was discovered that the Rothermel’s Surface Fire behavior model can be enhanced by eliminating&#xD;
some of its many variables. Therefore a set of variables were selected through some rationale and&#xD;
were experimented upon using GIS platforms to observe the effect they have on the Rothermel’s&#xD;
model. The study was conducted using historical wildfire data and the primary measure used was&#xD;
the Jaccard Similarity Coefficient. To assess the practicality of the model, a novel framework named&#xD;
‘MOD (Most Occurring Data) Sign’ analysis was proposed.&#xD;
The results of the study show that ‘fuel particle moisture’ and ‘live fuel load’ variables have&#xD;
significantly less effect on the Rothermel’s model. It was also discovered through the MOD Sign&#xD;
Analysis that ‘fuel particle moisture’ was the more practical variable to eliminate rather than ‘live&#xD;
fuel load’. Finally, it was concluded that a simplified model can be derived from the Rothermel’s&#xD;
model by eliminating ‘fuel particle moisture’ variable and while ‘live fuel load’ may also be&#xD;
eliminated, the resulting model will not be suitable for decision making.</description>
      <pubDate>Mon, 26 Jul 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4227</guid>
      <dc:date>2021-07-26T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Behavioral Analysis of Bitcoin Users on Illegal Transactions</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4226</link>
      <description>Title: Behavioral Analysis of Bitcoin Users on Illegal Transactions
Authors: SAMSUDEEN, F. Z. Z. M.; PERERA, H. P. D. U.
Abstract: Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for&#xD;
trading goods and services. The features such as anonymity, security and decentralization are the&#xD;
significant characteristics of Bitcoin. These features attract different types of users to adapt to this&#xD;
payment mechanism since 2009. In particular, it create several opportunities for criminals to&#xD;
involve in illegal and fraudulent activities. Thus, this research is based on the negative discussion&#xD;
around the Bitcoin.&#xD;
The thesis pays particular attention on identifying user behavioral patterns and significant&#xD;
facts among illegal incidents that are of varied nature. The study examines each illegal incident of&#xD;
different nature so that it is able to identify common spending patterns among illegal users. The&#xD;
motivation for choosing this study lack of literature that covers illegal incidents of various nature&#xD;
and analysis for patterns and significant facts in patterns.&#xD;
The analysis recognized spending pattern, popular exchanges used, and notable techniques&#xD;
used to cash out tainted Bitcoins. It shows that the illegal users utilize several techniques to cash&#xD;
out tainted Bitcoins. One way is to directly transfer to exchanges or Bitcoin washers or services&#xD;
which is an evaluation of a previous research. Another way is to transfer the Bitcoins in small&#xD;
amounts to several other their own addresses or to fresh wallets in subsequent transactions and&#xD;
thereafter transfer to exchanges. Bitcoins are transferred to fresh wallets in small amounts. They&#xD;
either transfer a constant amount of Bitcoins or in a certain proportion. These attempts are taken by&#xD;
illegal users with the intention of prevent being tracked by investigators. In addition, popular&#xD;
services such as Xapo.com, Helix Mixer and Poloniex.com were discovered as frequently used&#xD;
services.</description>
      <pubDate>Mon, 26 Jul 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4226</guid>
      <dc:date>2021-07-26T00:00:00Z</dc:date>
    </item>
  </channel>
</rss>

