Research Publications
DeepSelectNet: deep neural network based selective sequencing for oxford nanopore sequencing
doi: 10.1186/s12859-023-05151-0
Internet of things (IoT) for smart agriculture: Assembling and assessment of a low-cost IoT system for polytunnels
Nuwan Jaliyagoda
,
Sandali Lokuge
, P.M.P.C. Gunathilake, K.S.P. Amaratunga, W.A.P.Weerakkody, Pradeepa Bandaranayake,
Asitha Bandaranayake
PLOS One, 2023doi: 10.1371/journal.pone.0278440
IoTSmart FarmingControl SystemsAgriculture
Mixed-Reality Based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments
Dilshani Karunarathna
,
Nuwan Jaliyagoda
,
Ganindu Jayalath
,
Janaka Alawatugoda
,
Roshan Ragel
,
Isuru Nawinne
IEEE Access, 2023doi: 10.1109/ACCESS.2023.3317434
RoboticsSimulation
Forecasting Electricity Power Generation of Pawan Danavi Wind Farm, Sri Lanka, Using Gene Expression Programming
doi: 10.1155/2022/7081444
Interpretable Student Performance Prediction Using Explainable Boosting Machine for Multi-Class Classification
doi: 10.1109/ICARC54489.2022.9753867
Microservice Based Edge Computing Architecture for Internet of Things
doi: 10.1109/ICARC54489.2022.9753930
Cloud computingArchitectureScalabilityMicroservice architecturesComputer architectureReal-time systemsInternet of Things
On power analysis attacks against hardware stream ciphers
doi: 10.1504/ijics.2022.121289
differential power analysiscorrelation power analysissimple power analysispower analysis attackstream cipherTriviumGrainMICKEY
Random subspace and random projection nearest neighbor ensembles for high dimensional data
doi: 10.1016/j.eswa.2021.116078
Nearest neighbor ensembleHigh dimensional dataRandom subspace methodRandom projection method
Standard model leakage-resilient authenticated key exchange using inner-product extractors
Janaka Alawatugoda
, Tatsuaki Okamoto
Designs, Codes and Cryptography, 2022doi: 10.1007/s10623-022-01028-0
Leakage-resilient cryptographyAuthenticated key exchangeeCK modelCAFL-eCK modelStandard model
miRNAFinder: A comprehensive web resource for plant Pre-microRNA classification
doi: 10.1016/j.biosystems.2022.104662
A Novel FPGA Architecture of Commentz-Walter Algorithm using Bit-Split String-Matching Engines
Sugandima M. Vidanagamachchi,
Shirley D. Dewasurendra
2021 21st International Conference on Advances in ICT for Emerging Regions (ICter), 2021doi: 10.1109/ICter53630.2021.9774805
ProteinsSoftware algorithmsComputer architectureLogic gatesHardwareSoftwareRegisters
An accurate mathematical model predicting number of dengue cases in tropics
doi: 10.1371/journal.pntd.0009756
An optical physics inspired CNN approach for intrinsic image decomposition
Harshana Weligampola, Gihan Jayatilaka, Suren Sritharan, Parakrama Ekanayake,
Roshan Ragel
, Vijitha Herath, Roshan Godaliyadda
2021 IEEE International Conference on Image Processing (ICIP), 2021doi: 10.1109/ICIP42928.2021.9506375
ReflectivityNeural networksOptical fiber networksOptical imagingImage decompositionNumerical modelsOptical reflection
Data Mining System for Predicting a Winning Cricket Team
doi: 10.1109/ICIIS53135.2021.9660702
UncertaintyStatistical analysisConferencesGamesMachine learningData miningAustralia
DeepLight: Robust & Unobtrusive Real-time Screen-Camera Communication for Real-World Displays
doi: 10.1145/3412382.3458269
Human-centered computingUbiquitous and mobile computingComputer systems organizationEmbedded and cyber-physical systems
Ensuring Academic Integrity of Online Examinations
doi: 10.1109/ICIIS53135.2021.9660737
Source separationWebcamsAnnotationsTime series analysisPose estimationStreaming mediaFeature extraction
Objectively Measure Player Performance on Olympic Weightlifting
doi: 10.1109/ICIAfS52090.2021.9605963
Weight measurementSilverGoldAutomationCurrent measurementSustainable developmentVideos
Offloading specific performance-related kernel functions into an FPGA
doi: 10.1109/ISIE45552.2021.9576256
Performance evaluationProtocolsProfitabilityLinuxComputer architectureSoftwareSecurity
Revealing MicroRNA Biomarkers for Alzheimerâs Disease Using Next Generation Sequencing Data
doi: 10.1109/ICIAfS52090.2021.9606093
The correlation between three teleconnections and leptospirosis incidence in the Kandy District, Sri Lanka, 2004â2019
doi: 10.1186/s41182-021-00325-z
Transfer Learning for Accurate and Efficient Tomato Plant Disease Classification Using Leaf Images
doi: 10.1109/ICIIS53135.2021.9660681
Using Near-Infrared Spectroscopy for Vein Visualization
doi: 10.1109/ICIAfS52090.2021.9606126
VisualizationVeinsPrototypesClinical trialsSkinReal-time systemsSustainable development
A Data Driven Binning Method to Recover More Nucleotide Sequences of Species in a Metagenome
doi: 10.1109/MERCon50084.2020.9185388
GenomicsDNASequential analysisBioinformaticsTaxonomyClustering algorithmsBenchmark testing
A Programming Framework for Robot Swarms
doi: 10.1109/MERCon50084.2020.9185206
ProgrammingRobot kinematicsRobot sensing systemsHardwareLibrariesDebugging
A Retinex based GAN Pipeline to Utilize Paired and Unpaired Datasets for Enhancing Low Light Images
Harshana Weligampola,
Gihan Jayatilaka
,
Suren Sritharan
, Roshan Goldaliyadda, Parakrama Ekanayeka,
Roshan Ragel
, Vijitha Herath
MERcon, 2020doi: 10.1109/MERCon50084.2020.9185373
Low-light image enhancementRetinex theoryGenerative adversarial networksCycle consistencyComputer Vision
BATâBlock Analytics Tool Integrated with Blockchain Based IoT Platform
Chathurangi Edussuriya
,
Kasun Vithanage
, Namila Bandara,
Janaka Alawatugoda
,
Manjula Sandirigama
,
Upul Jayasinghe
, Nathan Shone, Gyu Myoung Lee
Electronics, 2020doi: 10.3390/electronics9091525
IoTblockchaindata analyticssmart contractsaccess management
Chronic kidney disease prediction using machine learning methods
doi: 10.1109/MERCon50084.2020.9185249
KidneyDiseasesMachine learningRed blood cellsHypertension
Control channel denial-of-service attack in SDN-based networks
doi: 10.1109/MERCon50084.2020.9185266
SwitchesComputer architectureDenial-of-service attackWorkstationsMeasurementServers
Detection of Novel Biomarker Genes of Alzheimerâs Disease Using Gene Expression Data
Shehan Perera, Kaveesha Hewage, Chamara Gunarathne, Rajitha Navarathna,
Damayanthi Herath
,
Roshan G Ragel
2020 Moratuwa Engineering Research Conference (MERCon), 2020doi: 10.1109/MERCon50084.2020.9185336
Principal component analysisFeature extractionForestryCorrelationSupport vector machinesDementia
GPU accelerated adaptive banded event alignment for rapid comparative nanopore signal analysis
Hasindu Gamaarachchi, Chun Wai Lam,
Gihan Jayatilaka
,
Hiruna Samarakoon
, Jared T. Simpson, Martin A. Smith, Sri Parameswaran
BMC Bioinformatics, 2020doi: 10.1186/s12859-020-03697-x
NanoporeSignal alignmentEvent alignmentMethylationGPUGPU accelerationOptimisationSoCNanopolishf5c
Genopo: a nanopore sequencing analysis toolkit for portable Android devices
Hiruna Samarakoon
,
Sanoj Punchihewa
, Anjana Senanayake, Jillian M. Hammond, Igor Stevanovski, James M. Ferguson,
Roshan Ragel
, Hasindu Gamaarachchi, Ira W. Deveson
Communications Biology, 2020doi: 10.1038/s42003-020-01270-z
GenopoNanopore Sequencing
New approach to practical leakage-resilient public-key cryptography
doi: 10.1515/jmc-2019-0014
Leakage-resilient cryptographypublic-key cryptographynon-interactive key exchangeauthenticated key exchangelow-latency key exchange
Public-key encryption in the standard model against strong leakage adversary
doi: 10.1093/comjnl/bxaa055
Raw transcriptomics data to gene specific SSRs: a validated free bioinformatics workflow for biologists
doi: 10.1038/s41598-020-75270-8
miRNAFinder: A pre-microRNA classifier for plants and analysis of feature impact
doi: 10.1109/CIBCB48159.2020.9277723
Feature extractionRNASupport vector machinesTestingAnimalsVegetationRandom forests
Adaptive hierarchical clustering for hyperspectral image classification: Umbrella Clustering
S.S.P. Vithana, E.M.M.B. Ekanayake, E.M.H.E.B. Ekanayake, A.R.M.A.N. Rathnayake,
G.C. Jayatilaka
, H.M.V.R. Herath, G.M.R.I. Godaliyadda, M.P.B. Ekanayake
Journal of Spectral Imaging, 2019doi: 10.1255/jsi.2019.a11
hyperspectral imageryspectral clusteringhierarchical classificationumbrella clusteringfeature extractionremote sensinglinear discriminant analysisself-organiseunsupervised
An ensemble learning approach for electrocardiogram sensor based human emotion recognition
doi: 10.3390/s19204495
bio-signal processingwearable computingensemble learningelectrocardiogrammachine learning
Comparison of optimization-and rule-based EMS for domestic PV-Battery installation with time-Varying local SoC limits
Akila Herath, Supun Kodituwakku, Dinithi Dasanayake, Prabath Binduhewa, Janaka Ekanayake,
Kamalanath Samarakoon
Journal of Electrical and Computer Engineering, 2019doi: 10.1155/2019/8162475
Integrating runtime validation and hardware-in-the-loop (HiL) testing with V & V in complex hybrid systems
doi: http://dx.doi.org/10.4038/jnsfsr.v47i4.9678
Model-based fault diagnosis and prognosis of dynamic systems: a review
doi: 10.1016/j.promfg.2019.02.060
model-based systemsfault diagnosisfault prognosisautomataPetri netsbond graphsBayesian networks
Non-contact Infant Sleep Apnea Detection
Gihan Jayatilaka
,
Harshana Weligampola
,
Suren Sritharan
,
Pankayaraj Pathmanathan
,
Roshan Ragel
,
Isuru Nawinne
IEEE International Conference on Industrial and Information Systems (ICIIS), 2019doi: 10.1109/ICIIS47346.2019.9063269
Sleep apneaVideo processingBio medical engineeringPattern recognition
Power-Aware High-Level Synthesis Flow for Mapping FPGA Designs
doi: 10.1109/MERCon.2019.8818883
Field programmable gate arraysPower demandHardwareOptimizationToolsIntegrated circuit interconnectionsHardware design languages
Review on leakage resilient key exchange security models
doi: 10.17762/ijcnis.v11i1.3790
Leakage-resilient cryptographyKey exchange protocolSecurity modelsLeakage attacksSide-channel attacksLeakage resilience
Average time complexity analysis of Commentz-Walter algorithm
SD Dewasurendra
, SM Vidanagamachchi
Journal of the National Science Foundation of Sri Lanka, 2018doi: http://dx.doi.org/10.4038/jnsfsr.v46i4.8630
Visual Design Platform for Wireless Sensor Network
doi: 10.1109/MERCon.2018.8421896
Wireless sensor networksMicrocontrollersDatabasesSkeletonVisualizationHardwareProgramming
Generic construction of an eCK -secure key exchange protocol in the standard model
doi: 10.1007/s10207-016-0346-9
Public-key cryptographyKey exchange protocolseCK modelStandard model
Genetic algorithm based cost optimization to integrate a community based wind turbine while considering smart appliances scheduling
doi: 10.1109/ICIINFS.2017.8300374
SchedulesGenetic algorithmsOptimizationWind power generationPower demandWind turbinesMathematical model
Identifying the optimal set of attributes that impose high impact on the end results of a cricket match using machine learning
Pranavan Somaskandhan, Gihan Wijesinghe, Leshan Bashitha Wijegunawardana,
Asitha Bandaranayake
,
Sampath Deegalla
2017 IEEE International Conference on Industrial and Information Systems (ICIIS), 2017doi: 10.1109/ICIINFS.2017.8300399
Sports equipmentData miningMeasurementSupport vector machinesStatistical analysisGamesRelational databases
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack
doi: 10.1109/ICIINFS.2017.8300359
BandwidthSide-channel attacksDictionariesServersData compression
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
doi: 10.1007/978-3-319-68637-0_10
Leakage-resilientKey exchange protocolsAfter-the-fact leakageContinuous-memory leakage
On the leakage-resilient key exchange
doi: 10.1515/jmc-2016-0003
Key exchange protocolssecurity modelsleakage-resilient cryptography
Accelerating k-nn classification algorithm using graphics processing units
doi: 10.1109/ICIAFS.2016.7946528
Graphics processing unitsMessage systemsKernelTrainingPrediction algorithmsMachine learning algorithmsTesting
Affordable real-time environment monitoring system for greenhouses
doi: 10.1109/MIES.2016.7780261
ServersGreenhousesSensor systemsRelaysMonitoringSensor phenomena and characterization
An optimized Parallel Failure-less Aho-Corasick algorithm for DNA sequence matching
doi: 10.1109/ICIAFS.2016.7946533
Pattern matchingDNAAlgorithm design and analysisKernelBioinformaticsIntrusion detectionGraphics processing units
An optimized Parallel Failure-less Aho-Corasick algorithm for DNA sequence matching
doi: 10.1109/ICIAFS.2016.7946533
Pattern matchingDNAAlgorithm design and analysisKernelBioinformaticsIntrusion detectionGraphics processing units
Implementation of OpenFlow based cognitive radio network architecture: SDN&R
doi: 10.1007/s11276-015-0973-5
Cognitive networksOpenFlowWireless SDNVirtual SSIDIEEE 802.11WARP5G networks
Leakage-resilient storage scheme for cryptographic applications
doi: 10.1109/ICIAFS.2016.7946548
Side-channel attacksProtocolsComputational modelingTimingEncryption
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
doi: 10.1109/MIES.2016.7780263
DictionariesServersCompression algorithmsCryptographyBrowsersEncodingBandwidth
Support of Mobile Phones in a Private Network for Science Teaching
Sakunthala Yatigammana Ekanayake,
Kamalanath Samarakoon
International Journal of Interactive Mobile Technologies, 2016doi: 10.3991/ijim.v10i2.4817
Mobile learningScience education
To use or not to use: CPUs' cache optimization techniques on GPGPUs
doi: 10.1109/ICIAFS.2016.7946534
ArraysOptimizationMergingCache memoryTestingKernelThroughput
Autonomic trust management in cloud-based and highly dynamic IoT applications
doi: 10.1109/Kaleidoscope.2015.7383635
Cloud computingSecurityBiological system modelingMonitoringInternet of thingsEcosystemsScalability
Exploring multilevel cache hierarchies in application specific mpsocs
doi: 10.1109/TCAD.2015.2445736
Algorithm design and analysisHardwareProgram processorsSpace explorationIntegrated circuit modelingMathematical modelOptimization
Exploring multilevel cache hierarchies in application specific mpsocs
doi: 10.1109/TCAD.2015.2445736
Algorithm design and analysisHardwareProgram processorsSpace explorationIntegrated circuit modelingMathematical modelOptimization
Feasibility of using machine learning to access control in Squid proxy server
doi: 10.1109/ICIINFS.2015.7399061
ManualsXMLStatic VAr compensators
Novel Way of Using Mobile Phone for an Outside Science Learning Activity
doi: http://doi.org/10.20533/licej.2040.2589.2015.0268
Performance evaluation techniques for an automatic question answering system
doi: 10.7763/IJMLC.2015.V5.523
Evaluation techniquequestion answeringNLPtemplate matchingFAQanswering system
Strategy to Design Formally Verified hardware/software implementation of Network Protocols on Reconfigurable Hardware
doi: 10.1109/ICIINFS.2015.7398980
application specific integrated circuitscomputer networksfield programmable gate arraysfinancial data processinghardware-software codesignprotocolsreconfigurable architectures
A structured hardware software architecture for peptide based diagnosis â Sub-string matching problem with limited tolerance
doi: 10.1109/ICIAFS.2014.7069624
ProteinsPeptidesHardwareAmino acidsSoftwareAutomataDatabases
Students behavioural analysis in an online learning environment using data mining
doi: 10.1109/ICIAFS.2014.7069609
Data miningData visualizationElectronic learningClustering algorithmsMaterialsLeast squares approximationsDatabases
To use or not to use: Graphics processing units (GPUs) for pattern matching algorithms
doi: 10.1109/ICIAFS.2014.7069585
Graphics processing unitsCentral Processing UnitPattern matchingParallel processingAlgorithm design and analysisPerformance evaluationSoftware algorithms
A Study on Instruction-set Selection Using Multi-application Based Application Specific Instruction-set Processors
doi: 10.1109/VLSID.2013.154
HardwareThumbEmbedded systemsBenchmark testingStandardsInstruction sets
AntiPlag: Plagiarism detection on electronic submissions of text based assignments
doi: 10.1109/ICIInfS.2013.6732013
PlagiarismClustering algorithmsEducational institutionsInformation systemsDetectorsComputersConferences
CSER: HW/SW configurable soft-error resiliency for application specific instruction-set processors
Tuo Li, Muhammad Shafique, Semeen Rehman,
Swarnalatha Radhakrishnan
,
Roshan Ragel
, Jude Angelo Ambrose, Jörg Henkel, Sri Parameswaran
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013doi: 10.7873/DATE.2013.152
RedundancyTime factorsRuntimeIntegrated circuitsProgramming
DRMA: dynamically reconfigurable MPSoC architecture
Lawrance Zhang, Jude Angelo Ambrose, Jorgen Peddersen, Sri Parameswaran,
Roshan Ragel
,
Swarnalatha Radhakrishnan
, Kewal K. Saluja
GLSVLSI '13: Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI, 2013doi: 10.1145/2483028.2483101
Computer systems organizationArchitecturesSerial architecturesPipeline computingHardware
Fusion of Colour, Shape and Texture Features for Content Based Image Retrieval
doi: 10.1109/ICCSE.2013.6553949
AccuracyClassification algorithmsComputersArraysImage edge detection
Hardware accelerated protein inference framework
doi: 10.1109/ICIInfS.2013.6732061
ProteinsPeptidesHardwareTilesSoftwareField programmable gate arraysAcceleration
Hardware software co-design of the Aho-Corasick algorithm: Scalable for protein identification?
doi: 10.1109/ICIInfS.2013.6732003
HardwareProteinsPeptidesSoftware algorithmsProgram processorsAlgorithm design and analysis
Model in the loop testing of complex reactive systems
doi: 10.1109/ICIInfS.2013.6731950
Mathematical modelInduction motorsTestingMATLABElevatorsFloors
Personalized and adaptive user interface framework for mobile application
doi: 10.1109/ICACCI.2013.6637474
User interfacesEnginesMobile communicationContextRendering (computer graphics)AndroidsHumanoid robots
Accelerating string matching for bio-computing applications on multi-core CPUs
doi: 10.1109/ICIInfS.2012.6304784
Instruction setsThroughputSoftware algorithmsPattern matchingAccelerationAlgorithm design and analysis
Commentz-walter: Any better than aho-corasick for peptide identification?
doi: 10.7815/ijorcs.26.2012.053
Aho-CorasickCommentz-WalterPeptide Identification
Constant time encryption as a countermeasure against remote cache timing attacks
doi: 10.1109/ICIAFS.2012.6419893
EncryptionTimingSoftwareHardwareClocksComputers
DIMSim: A rapid two-level cache simulation approach for deadline-based MPSoCs
Mohammad Shihabul Haque,
Roshan Ragel
, Angelo Ambrose,
Swarnalatha Radhakrishnan
, Sri Parameswaran
8th IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, 2012doi: 10.1145/2380445.2380473
HardwareHardware validation
Instruction-set selection for multi-application based ASIP design: An instruction-level study
doi: 10.1109/ICIAFS.2012.6419895
GSMEnginesIntegrated circuitsTransform coding
Design and implementation of a statechart based reconfigurable elevator controller
HPAP Jayawardana, HWKM Amarasekara, PTS Peelikumbura, WAKC Jayathilaka, SG Abeyaratne,
SD Dewasurendra
2011 6th International Conference on Industrial and Information Systems (ICIIS), 2011doi: 10.1109/ICIINFS.2011.6038093
ElevatorsFloorsField programmable gate arraysPrototypesSensorsMathematical modelControl systems
Heterogeneous processor pipeline for a product cipher application
doi: 10.1109/ICIINFS.2011.6038036
PipelinesEncryptionAlgorithm design and analysisPartitioning algorithmsStreaming mediaComputer architecture
Statechart based modeling and controller implementation of complex reactive systems
doi: 10.1109/ICIINFS.2011.6038120
ElevatorsGeneratorsSoftwareAutomataProcess controlFloorsHardware
Tile optimization for area in FPGA based hardware acceleration of peptide identification
doi: 10.1109/ICIINFS.2011.6038056
PeptidesField programmable gate arraysTilesHardwareSoftware algorithmsProteinsSoftware
Using microkernel based virtualization for Byzantine fault tolerance
doi: 10.1109/ICIINFS.2011.6038037
HardwareKernelComputer bugsInformation systemsUSA CouncilsFault tolerant systems
An automatic answering system with template matching for natural language questions
doi: 10.1109/ICIAFS.2010.5715686
DatabasesSyntacticsNatural languagesComputersArtificial intelligenceMobile handsetsRobots
Loop unrolling in multi-pipeline ASIP design
doi: 10.1109/ICIINFS.2009.5429845
Application specific processorsAuthenticationComputer scienceSteganographyImage analysisAlgorithm design and analysisComputer industryInformation systemsPostal servicesEntropy
Security weaknesses of WEP protocol IEEE 802.11b and enhancing the security with dynamic keys
Manjula Sandirigama
, Rasika Idamekorala
2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH), 2009doi: 10.1109/TIC-STH.2009.5444462
AuthenticationCryptographyData securityRandom number generationComputer securityCommunication system securityData communicationAccess protocolsComputer hackingInformation security
Axis2UNO: Web Services Enabled Openoffice.org
doi: 10.1109/ICIAFS.2008.4783956
Web servicesSearch enginesComputer networksMaintenance engineeringJavaData securityPackagingOffice automationInformation technologyResource management
SAS-3: A polynomial based strong password authentication protocol
N. S. Weragama,
M. Sandirigama
2007 International Conference on Industrial and Information Systems (ICIIS), 2007doi: 10.1109/ICIINFS.2007.4579145
PolynomialsAuthenticationProtocolsComputer crimeSynthetic aperture sonarInformation systemsInternetSecurityComputer industryMobile communication
An expert design environment for electrical devices and its engineering assistant
S.R.H. Hoole, A. Mascrenghe, K. Navukkarasu, K. Sivasubramaniam
IEEE Transactions on Magnetics, 2003doi: 10.1109/TMAG.2003.810189
Design engineeringMesh generationKnowledge engineeringDesign optimizationSoftware prototypingPrototypesElectric motorsProcess designFinite element methodsSoftware libraries
This webpage is based on the publications submitted through here, managed via https://api.ce.pdn.ac.lk/.
Notification