Browsing Computer Science & Engineering Symposium by Title

Sort by: Order: Results:

  • Senanayake, DA [Conference-Full-text]
    The web services industry has evolved to a point where a lot of services are provided for free or a free tier of services is offered, most of the times. An attempt of trying to exploit this situation is to try and implement ...
  • Chathuranga, RGC; Dassanayaka, DMSR; Jayasekara, WAS; Kannangara, DLS; Wattalaeniya, LPK [Conference-Full-text]
    Time spent by humans, interacting with computer systems to perform day today activities increase with the development of the world. Hence it is useful and important to identify and analyze the factors that affect Human ...
  • Kumarasinghe, CU [Conference-Full-text]
    This paper was written to give an idea about the windows network monitor extension which was developed in order to improve system security and application accountability of windows processes and to help the user to be ...
  • Herath, SWHMSP; Gunarathna, UARR; Hettiarachchi, HAC; Herath, HMAB; Wickramanayake, SKK [Conference-Full-text]
    Turning a new chapter in game theory some of its applications to the field of Software Engineering are explored recently. Game theory addresses strategic problems. There are many aspects in software development process ...
  • Dassanayake, DMUC; De Silva, LYSG; Fernando, MDY; Jayawardana, DDSL; Ranatunga, AI [Conference-Full-text]
    parallel computing is one of the main solutions for the newly arising computational problems, implementations of parallelism are multi-core systems. To improve the performance in specific usage such as matrix multiplication ...
  • Welivita, KA [Conference-Full-text]
    AskFedora is a well known community knowledge base and a support forum, which provides community support for Fedora users. It is powered by Askbot, a Python and DJango based web application. With time, the user interface ...
  • Subashith, SKTD [Conference-Full-text]
    Today there are many e-learning systems that fulfill the thirst for education. Those e-learning systems have many courses in different fields. There are so many e-classes that teach how to program in many different ...
  • Kumarasiri, MKDS [Conference-Full-text]
    This paper discusses the project Automator which is a location and battery level based automatic profile changer, location based alarm and SMS sender. This is a third party software developed for Android operating ...
  • Liyanagunawardana, AS; Shanika, TGT; Rajagopalasarma, J; Wijenayake, CBA; Wijeweera, BS [Conference-Full-text]
    This paper discuss about short message services and its usages and the dynamical behaviors of the people who use this services. The report starts with an introduction about how the SMS system is working and what are ...
  • Abeysekara, M [Conference-Full-text]
    Computer based visualizations have been a popular approach that provides accurate and efficient visualization techniques to the users. There is an increasing growth in geographical data with the development of mobile ...
  • Subasinghe, SP [Conference-Full-text]
    Although the Moodle facilitates the Accessibility feature for visually impaired people it is not much user friendly for them. The requirement of third party software is the main limiting factor in the existing solution. ...
  • Thirunavukkarasu, N [Conference-Full-text]
    “BLOOD” is one of the most essential necessities of our lives. Mostly during accidents or most of the hospitals issues the need for blood is the common problem. In addition to emergency requirements, advances in medicine ...
  • Uthayakumar, M [Conference-Full-text]
    Day to day there are many blood donations happening all over the world to save many lives. The main problem in blood donation is finding the blood donors within a short period of time during an emergency. Currently there ...
  • Dangalla, DADJS [Conference-Full-text]
    This paper discusses a system that provides an admin system and a public website for a book store with multiple branches. The admin system allows multiple user levels of the staff members to log in and perform ...
  • De Silva, HP; Siriwardana, TWRO; Somasiri, RPIT; Surasinghe, SAHB; Surendra, KHA [Conference-Full-text]
    The purpose of this literature review is to provide information about current status of digital divide, explore reasons for digital divide and issues rose on society and provide a summary of initiatives that can be taken ...
  • Nimalsiri, NI [Conference-Full-text]
    Mobility is a basic human requirement for traversing between different locations. Public transport bus service fulfills this requirement by operating according to a published timetable along a route calling at agreed bus ...
  • Iroshan, AKA; Indrajee, KHH; Mahawithana, P; Dharshana, KUGS; Premarathna, PHSR [Conference-Full-text]
    Cryptography is a concept and a methodology for secret communication, which is used and improved thousands of years. Cryptography includes a vast variety of implementation schemes, starting from simple shifting ciphers to ...
  • Rasnayaka, S [Conference-Full-text]
    This paper discusses a computer vision system to detect western music notations from images. The developed library will take in images of western music sheet notation and identify the key features necessary to extract ...
  • Weerasinghe, BAJN; Weerasinghe, VP; Pirinthapan, M; Nanayakkara, DAU; Perera, LNPT [Conference-Full-text]
    This paper discusses on human mind and computer intelligence. It briefly discusses about the structure of the brain and explores how human brain can interact with machines using Brain Computer Interaction. Then the ...
  • Anicitus, PDDA; Dissanayake, MDAS; Jayawardena, SS; Lakjeewa, DM; Basnagoda, SNR [Conference-Full-text]
    The evolutionary development of Information and Communication Technology has become a doubled edge knife since it has made human life console and easy, and at the same time unsafe and vulnerable. In this paper we have put ...