Journal of Computer Science
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By University Of Sri Jayewardenepura

2362-0110

2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Abdoun Otman

In this paper, we interest to present an expert system to simplify the management the human resources mobility within a multi-sites enterprise. This expert system uses new methods to solve a complex problem of spatial mobility of Human resources witch is studied in works [01] and [02]. In this system, we incorporate algorithm based on bilateral permutation (transposition) algorithm, circular permutation algorithm and factious (virtual) post algorithm in order to simplify the management of Human resources mobility. The goal is improving the mobility rate, to reduce the number of operations, resulting in a significant reduction of computation time. We will apply this system on practical examples and the results obtained will be show the advantage of using it.


2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Daniel Matthias

This research took a comparative analysis on string matching algorithms. The study focused on developing an efficient algorithm (Back-navigation String matching algorithm) which will be used for large documents. The algorithm whilst compared to the existing system introduced a pattern of search which was done backwardly, from the last character to the first. The existing system considered more number of shifts which was slow and has a bad character shift. The research aimed at developing an efficient string matching for large documents sorting. The research methodology adopted for this project research is the verification and validation methodology which perform its test in a reverse manner so the software developer can at each stage review its step. The proposed system was executed and produced a result which compared with the existing system was termed efficiency. The system introduces a faster means of searching which starts form the last character to the first. The developed system which is the efficient string matching algorithm was analyzed and displayed a faster means of searching documents and is termed efficient because of its computing speed of 2 milliseconds while the naïve algorithm which ran with the computing speed of 154 milliseconds for a total number of 5000 characters.


2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Asma Taslim

ABSTRACTAgile practices are release planning, sprint planning, and standup meetings. The Agile provides the requisite time and space for teams, enabling them, to collaborate with each other and build relationship among them. Frequent short meetings are being held daily by Agile teams to identify potential collaboration opportunities to be followed. User Centered Design (UCD) is a user interface design process which lays great emphasis on the usability objectives, user features, environmental circumstances, tasks and work input/flow in the design/model of an interface. However, some challenges occurred when the UCD joins the Agile process such as usability issues, collaboration problems, usability testing etc. The proposed model not only embraces the relevant issues but it resolves the same to a great extent. The evaluation of said model is done through a case study.  


2016 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
May Htet ◽  
Su Wai Phyo

In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text. 


2016 ◽  
Vol 2 (1) ◽  
pp. 12-19 ◽  
Author(s):  
Aye Zarchi Minn ◽  
May Zin Oo

Greedy Perimeter Stateless Routing (GPSR) gives the good forwarding nodes for Mobile Ad Hoc Networks (MANET) but does not provide the right directional forwarding nodes in Vehicular Ad Hoc Network (VANET). This is the fact that MANET uses the nodes without limitations in moving but VANET uses fixed infrastructure in mobility such as roads with lanes. The key of original greedy forwarding is choosing the forwarding node with the shortest distance between the source and the destination. It does not consider the direction of the forwarding nodes, which possibly cause the selected forwarding node going opposite direction from the destination. This paper thus tries to improve the greedy forwarding method of Greedy Perimeter Stateless Routing (GPSR) by taking into considerations in both the distance and the direction. Moreover it shows the mystery of angle that gives the right direction. The optimized GPSR (OGPSR) using improved greedy forwarding provides the better throughput, average end-to-end delay and routing overheads than the original GPSR.


2016 ◽  
Vol 2 (1) ◽  
pp. 20-29
Author(s):  
Ayanthi Saranga Jayawardena ◽  
S.C. Wickramasinghe ◽  
S.R.U. Wimalaratne

AbstractObjectives:To describe the use of Electronic Hospital Information System(EHIS) by the staff, to assess the competency of them to handle the EHIS and to assess the computer literacy among health care workers at the Out Patient’s Department(OPD) in District General Hospital(DGH) Trincomalee.Study design:A cross sectional descriptive study. A competency assessment test and a self administered questionnaire were used. Participants: All the staff members operating the EHIS at the OPD in DGH Trincomalee. Results: Regarding the general use of the EHIS medical officers (100%) used the EHIS to write prescriptions,(>70%)to get the patient’s socio-demographic details, enter patient’s history to retrieve previous medical records, to obtain what drugs available and what drugs out of stock at the outdoor pharmacy, for notification of diseases and used less frequently to get the laboratory reports (50-70%). The system was used for 17 tasks out of 20 tasks and most unused tasks were write the diagnosis according to the ICD-10. Nurses and attendents used the system less than half of the tasks for which the system was functional. The pharmacists use of the system was optimal. Overall respondents’ competency of using the system were high (>80%). Conclusions: Majority of staff members had low level of computer literacy. Majority of them used the system successfully. Recommendations: To strengthen the training program,combat several constraints and upgrade the system, provide digital X-ray imaging and download them to CDs and improved to write the diagnosis according to the ICD-10.Key words: Electronic Hospital Information System, Multi Disease Surveillance, Computer Literacy. 


2013 ◽  
Vol 1 (1) ◽  
pp. 20-34
Author(s):  
K.A. Chandralal Perera ◽  
Shahani Weerawarna

This research explores Free and Open Source Software (FOSS) adoption in the Sri Lankan banking sector. It produces two types of results, which are unique. One is an 8-level abstract model based on the criticality for the business, which represents all the software application usage in Sri Lankan banks. Then it presents the adoption of FOSS in banks, in terms of two quantified indices, namely General FOSS Adoption Index and Category Specific FOSS Adoption Index. The first index modeled so that it represents the ‘strategic nature of usage of FOSS’ as well as the ‘FOSS friendliness’ within the bank. The second index represents the FOSS adoption in the bank, in terms of extraction of the ‘best technological features out of them’ and the ‘level of adoption’. The results reveal that the Sri Lankan banks do not have good levels of FOSS adoption, though all the banks use FOSS applications for some purpose or another.  By further drill down into the model, it was discovered that the lack of government policy initiative towards FOSS has had a causal effect on the poor adoption ratings in the Sri Lankan banking context. Further it will greatly helpful to have FOSS supportive software business in the country, which will influence banks to get better service for FOSS products.


2013 ◽  
Vol 1 (1) ◽  
pp. 11-19
Author(s):  
H.H. Weerasena ◽  
P. B. S. Bandara ◽  
J.R.B. Kulasekara ◽  
B. M. B. Dassanayake ◽  
U. A. A. Niroshika ◽  
...  

Today, automated camera surveillance systems play a major role in securing public and private premises to ensure security and to reduce crime by detecting behavioral changes of moving objects. The important goal of such a surveillance system is to reduce human intervention while at the same time, provide accurate detection of moving objects. Many researchers have attempted to automate different aspects of camera surveillance such as tracking humans, traffic controlling, ground surveillance, etc. However, a system that overcomes overall difficulties that arise in the task of object detection and object tracking has not been developed because of high variance in the problem domain. The proposed system tracks the path of a locked object through a network of cameras. In contrast to traditional methods where the operators have to switch the screens manually to find the target objects, the proposed technique, once locked to an object; automatically tracks it through a camera network and generates the path on a map. We propose to use stereo cameras to enhance the detection and tracking of objects in 3D space.


2013 ◽  
Vol 1 (1) ◽  
pp. 1-10 ◽  
Author(s):  
G.L.P.N. Gangabada ◽  
S. C. Premaratne

Mobile advertising and profiled advertising has become major discussion topics recently. With rapid development of mobile technology in the last decade, many e-business organizations are trying to combine the latest mobile technologies with customer profiling in order to increase the reachability of their product information among the target market. This paper presents a potential mechanism to enhance such mobile advertising by improving existing user profile methods. The main goal of this research is to introduce a novel user profiling mechanism that can be used to improve the productivity of a mobile advertising system. The proposed system is capable of providing additional information such as video, audio, etc. about advertisements to the user while giving profile-based and proximity suggestions.


2013 ◽  
Vol 1 (1) ◽  
pp. 44-48
Author(s):  
B. Gomathy ◽  
S.M. Ramesh ◽  
A. Shanmugam

Coronary heart disease (CHD) is one of the major causes of disability in adults as well as one of the main causes of death in the developed countries. Although significant progress has been made in the diagnosis and treatment of CHD, further investigation is still needed. The objective of this study was to develop the assessment of heart event-risk factors targeting in the reduction of CHD events using Association Rule Mining. The risk factors investigated were: 1) before the event: a) non modifiable—age, sex, and family history for premature CHD, b) modifiable—smoking before the event, history of hypertension, and history of diabetes; and 2) after the event: modifiable—smoking after the event, systolic blood pressure, diastolic blood pressure, total cholesterol, high density lipoprotein, low-density lipoprotein, triglycerides, and glucose. The events investigated were: myocardial infarction (MI), percutaneous coronary intervention (PCI), and coronary artery bypass graft surgery (CABG).Data-mining analysis was carried out using the Association Rule Mining for the afore mentioned three events using five different splitting criteria for larger datasets. The most important risk factors, as extracted from the classification rules analysis were: 1) for MI, age, smoking, and history of hypertension; 2) for PCI, family history, history of hypertension, and history of diabetes; and 3) for CABG, age, history of hypertension, and smoking. It is anticipated that data mining could help in the identification of high and low risk subgroups of subjects, a decisive factor for the selection of therapy, i.e., medical or surgical.


Sign in / Sign up

Export Citation Format

Share Document