<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4148</link>
    <description />
    <pubDate>Wed, 29 Apr 2026 15:50:41 GMT</pubDate>
    <dc:date>2026-04-29T15:50:41Z</dc:date>
    <item>
      <title>Digital Validation Framework for Open Badges</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4521</link>
      <description>Title: Digital Validation Framework for Open Badges
Authors: Wijeratna, I.K.
Abstract: Open Badge is very novelty concept in E-learning domain to motivate the recipients&#xD;
and it could be used as a symbol of the achievement in digital world. This concept is&#xD;
new to e-learning, but this concept is commonly using in a physical world such as&#xD;
Scouts are having badges. Once a person completed a task or a course, a digital badge&#xD;
will be awarded, and it could be used as symbol of achievement. If user gets this badge&#xD;
from well reputed institute/organization, it creates a value to him and could be used as&#xD;
a symbol of certificate.&#xD;
So, this badge concept is implemented in IT industry and it is a one of the newest trends&#xD;
in E-learning. In digital world, this badge also a digital artifact and it uses web page&#xD;
which is link to the badge to show the details of the badge. However, there are several&#xD;
security threats in this concept in digital world such as it could be able to redesign&#xD;
digital badge with same look and feel, create a fraud web pages with fraud information&#xD;
and grant it to someone who has not achieved such. Then it decreases the value and&#xD;
trust of the original badge as well. People don’t trust the digital badge due to this reason&#xD;
and the badge cannot be used for its purpose. People don’t use badges even though it is&#xD;
expected to use. Hence it is a big need to find method to show the originality of the&#xD;
badge and It needs be validated in somehow to overcome above problem.&#xD;
Therefor it is developed the solution to overcome above mentioned problems and this&#xD;
thesis is describing that solution. Further it discusses about how to validate and verify&#xD;
the open badge using existing and well-known technologies because, people who do&#xD;
validate this may or may not be an IT person. Hence It must to find out the most usually&#xD;
use techniques in today’s world and wrap up our mechanism using it. Therefor it&#xD;
proposes a new way of bind information with digital badge and validate the digital&#xD;
details against it. so, it enhances the usability, reliability , security features and it opens&#xD;
the new ways of using it. Previously the Open badge should be used online only or else&#xD;
it is just an image. But with new concept, The Badge could be used in offline mode as&#xD;
well. Because information is bind with the badge itself. People can use it with the CV&#xD;
as an attachment. Nobody can steal the badge and create new badge, if some did it, it&#xD;
would be caught when they try to validate the badge.&#xD;
This is a totally new idea and it will enhance the usability and open a new chapter of&#xD;
open badge in a future.</description>
      <pubDate>Wed, 11 Aug 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4521</guid>
      <dc:date>2021-08-11T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Using cryptocurrency along with smart contracts to create a social platform</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4520</link>
      <description>Title: Using cryptocurrency along with smart contracts to create a social platform
Authors: KULASANGAR, G.
Abstract: The common problem in this era, is that the companies or websites which are being utilized by&#xD;
the consumers, or rather the public, have been providing services solely for their own business&#xD;
growths and profits. Which ideally, leaves the customers to limited resources, based on the&#xD;
amount they pay. The community related apps or websites these days, aren’t about contributing&#xD;
and benefitting from or to the community. It’s about entirely receiving the benefits. Hence the&#xD;
motivation towards this research component is that, to create a platform which is entirely&#xD;
decentralized, and any benefits and contributions will be made by the users themselves. The&#xD;
benefits to the customer base would be given in the form of a digital currency.&#xD;
Existing applications which are out there in the world, are pretty much storing the user’s personal&#xD;
data, and holding the ownership of those data. These data are being stored in servers which are&#xD;
spread across the globe, which could be either owned by Google or Apple or Microsoft. The&#xD;
concept of SMART Contract will be utilized as the middleman between all the consumers or users&#xD;
and the application, in order to make sure that the appropriate user is given the relevant&#xD;
privileges to gain or contribute from or to the community. So that the consensus problem is being&#xD;
rectified and makes sure that there won’t be any frauds or manipulations within the community.&#xD;
Having a decentralized application would make sure that the users of the application are aware&#xD;
that their personal information can only be altered by themselves, not by anyone else. So as a&#xD;
proof of study, in order to prove that applications can be built as decentralized so that only the&#xD;
users will be benefited with the services. Along with the increase of population here in Sri Lanka,&#xD;
most of the people do travel by using the public transport, ie. Train, Bus. As an example, most of&#xD;
the people are still struggling to figure out the daily schedule (departure and arrival) and the time&#xD;
duration for a whole journey of a train, which would ideally make every single public’s daily plans&#xD;
even worse. Since the people are quite unsure of the time, when the train would leave or arrive&#xD;
from or to a station, they will have to be at the station way early than normal in order to make&#xD;
sure that they catch the train or either they might get late to reach a destination. Hence, it’s easy&#xD;
for people, if they’re aware well ahead of this, they can decide accordingly.&#xD;
In order to do that, I’m trying to build up a community platform where the users are the public&#xD;
(contributors + non-contributors), and they can contribute to the community in order to earn&#xD;
themselves some benefits from the application. So the platform would be using the Ethereum's&#xD;
Ether, which is a cryptocurrency just like Bitcoin, as the benefit for the user and the core of this&#xD;
platform would be utilizing the concept of Smart Contract which relies on the abstraction of&#xD;
Blockchain which is a decentralized chain which keeps the track of the relevant information of&#xD;
all the users and their relative tokens within the network.</description>
      <pubDate>Wed, 11 Aug 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4520</guid>
      <dc:date>2021-08-11T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Automatic Text Summarization for Sinhala</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4442</link>
      <description>Title: Automatic Text Summarization for Sinhala
Authors: Wimalasuriya, O.S
Abstract: According to the people life style, people are surrounded with vast amounts of information albeit with&#xD;
less and less time or ability to make sense of it. Automatic summarization first started as early as in the&#xD;
1950s.In the modern world due to lack of the time, generating an accurate and intelligent summary for a&#xD;
long document or text pieces has become a popular research as well as an industry problem. This&#xD;
research is carried out to find the suitable approaches to address the above mention issue with minimum&#xD;
linguistic resources.&#xD;
This research proposes a solution for summarizing Sinhala text by identifying the most important&#xD;
and relevant sentences based on linguistic and statistical features of a given text, using an&#xD;
unsupervised extractive summarization approach. In order to generate a better summary, keyword&#xD;
and sentence extraction is manipulated by using a graph based TextRank algorithm.&#xD;
The proposed method was evaluated by comparing the machine generated summaries and human&#xD;
generated summaries based on the assumption that human generated summaries are perfect. The critical&#xD;
evaluation was done by using ROUGE-n and F1 Score to ensure the proposed method usability,&#xD;
performance and efficiency. According to the ROUGE-n values it gives more than 60% of recall rate and&#xD;
more than 42% of precision rate. Further, this research provides a benchmark for future research on&#xD;
Sinhala automatic text summarization.</description>
      <pubDate>Wed, 04 Aug 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4442</guid>
      <dc:date>2021-08-04T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Alternative Approach for Authenticating Subflows of Multipath Transmission Control Protocol using Application Level Key</title>
      <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4440</link>
      <description>Title: Alternative Approach for Authenticating Subflows of Multipath Transmission Control Protocol using Application Level Key
Authors: Wijethilake, T. N. B.
Abstract: Multipath Transmission Control Protocol (MPTCP) is an extension to Transmission Control&#xD;
Protocol (TCP) proposed by the Internet Engineering Task Force (IETF). The main intention&#xD;
of MPTCP was to use multiple network interfaces in a single network connection&#xD;
simultaneously. MPTCP create multiple TCP connections, which are known as subflows&#xD;
between two hosts. With the use of multiple connections, the throughput of the connection can&#xD;
be improved. Due to the availability of redundant connections, MPTCP can recover from&#xD;
network connection failures efficiently without noticing the application.&#xD;
It is clear that there is a number of advantages related to MPTCP. But researchers have&#xD;
identified that there are a considerable amount of security threats related to the connections&#xD;
initiated by MPTCP. These connections are vulnerable to a number of attacks like DoS&#xD;
attacks, flooding attacks, connection hijacking and so on. MPTCP shares a set of keys when&#xD;
establishing the first connection, also known as the first subflow and use these shared keys to&#xD;
authenticate the next subflows created by the hosts. These keys were in plain text format. One&#xD;
of the main reason for the security vulnerabilities is the exchange of keys in plain text format.&#xD;
A number of solutions were proposed to mitigate these security vulnerabilities. Using an&#xD;
encryption mechanism to secure the keys and changing the header formats are some of them.&#xD;
But this research is inspired by one of the proposed solutions to use external keys to&#xD;
authenticate the subflows. It has proposed to use new socket APIs to obtain the keys from the&#xD;
application level to authenticate the connection. But still, there is no proper implementation of&#xD;
this solution. Therefore as a proof of concept, this research has explored some alternate&#xD;
mechanism to use external keys to authenticate the subflows generated by the MPTCP with&#xD;
minimum modifications to the currently available MPTCP version.&#xD;
It has conducted a number of experiments on top of MPTCP in order to understand the&#xD;
behavior of the protocol, such as configuring of web server with MPTCP and connecting&#xD;
MPTCP enabled client so on. The final outcome of the research has been implemented on the&#xD;
Linux kernel and several experiments were conducted to examine the robustness of the&#xD;
solution, performance. Finally, the solution has evaluated whether the solution has achieved&#xD;
the requirement to use the external keys to authenticate the subflows</description>
      <pubDate>Wed, 04 Aug 2021 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4440</guid>
      <dc:date>2021-08-04T00:00:00Z</dc:date>
    </item>
  </channel>
</rss>

