ERU - 2012
http://dl.lib.uom.lk/handle/123/14689
2024-03-29T03:47:40ZProceedings of the 18th Annual Research Symposium 2013 [Pre Text]
http://dl.lib.uom.lk/handle/123/19877
Proceedings of the 18th Annual Research Symposium 2013 [Pre Text]
Rodrigo, R
2013-02-01T00:00:00ZForevidizer: forensic video & image analyzing toolkit
http://dl.lib.uom.lk/handle/123/19876
Forevidizer: forensic video & image analyzing toolkit
Wijayasiri, A; Sampath, C; Rathnayaka, N; Jayaweera, R; De Silva, C
Rodrigo, R
Digital videos and images have become a common thing in life. More and more sophisticated tools are becoming
available for the general consumers. With the advancement of digital image processing and video processing
technologies, various kinds of images and videos are produced from different perspectives. As a result videos can be
used for various frauds and illegal activities. Legislative changes have been made to accept videos and images from
digital cameras as witnesses for legal proceedings. Consequently there is a growing interest in forensic analysis of
video content where the integrity of digital images and videos need to be checked. In this respect it has become
essential to have a proper toolkit to analyze whether a particular video is a real one or one that has been tampered
with. As video editing techniques are getting very sophisticated, tampered videos are hard to detect. However, when a
video is tampered with, some of the basic properties of the video are changed. Then to detect those changes it is needed
to use complex image processing and video processing techniques and algorithms. We present methods to analyze
these properties of a given video, and produce statistical details for the video to ascertain whether it is tampered
with or not, and if it is tampered with then what changes have been made. Video frame duplicate detection, video
double MPEG compression detection, image double JPEG compression detection and duplicated regions within image
detection are the basic methods of forgery detections.
2013-02-01T00:00:00ZBeyond the traditional telecom promotions, with the escalating customer Base
http://dl.lib.uom.lk/handle/123/19875
Beyond the traditional telecom promotions, with the escalating customer Base
Jayawardhana, MKPR; Kumara, PAKM; Perera, TDK; Paranawithana, WDAI; Anjitha, T; Weerawarana, SM
Rodrigo, R
Through the past years, traditional telecom customer base has escalated with wide usage of mobiles. But the
services and promotions offered by the service providers has been limited to a specific frame, without
extracting useful information from the data they gather with each call. Specifically in mobile user segment,
there is lot of data available for the service provider other than the credit balance to consider in giving away
service and promotions. Among many reasons, a barrier for this is the technical feasibility. With the growing
customer base and elastic behavior of network usage with the time and seasons, proposing an effective way of
available data analyzing is challenging. It becomes more challenging when the results are required in near
real time for the promotion to be of use. With this research studyt we discuss and compare the available
technologies to be used, propose a system with the most appropriate technologies and express the results
gained with an implemented prototype ‘Kanthaka'.
2013-02-01T00:00:00ZDistributed intelligence as anlnformation retrievalsystem
http://dl.lib.uom.lk/handle/123/19874
Distributed intelligence as anlnformation retrievalsystem
Jayathilake, DSP; Herath, HMST; Wimalasooriya, RDDP; Karunarathne, SDJ; Weerawardhane, S
Rodrigo, R
such as Geographic Information Systems (CIS), because accurate information of geographic data a spat,ally
distributed and vast in volume. The challenge is to improve the process of information retrieval, which can be applied
to varying contexts such as GIS, going beyond the limits imposed by the knowledge base centric approaches. Social
networks possess a vast amount of unstructured knowledge in its user base, which can be use in a awing interesting
patterns, if analyzed in a systematic approach. In this paper, we emphasize on an approach for information search and
retrieval, bv combining the social network of human intelligence and knowledge bases of information. Users of the
system can present natural language queries, and questions be directed to relevant experts within the social
network. Distributed information retrieval and information fusion is applied to optimize the process oj single answer
generation. The feasibility of our proposed architecture is investigated by implementing a QA(Question Answering)
system on a social network as a proof of concept. The Question Answering System is based on geogi aphic queries
which will be directed to relevant users within the network to gather answers. Varying methods of information fusion
and Natural Language Processing have been researched and discussed to discover the suitable approaches for
generation. With the wide acceptance of the social networking paradigm and sharing of information, this approach
be extended to other domains as well.
2013-02-01T00:00:00Z