CSE Symposium - 2012

 

Recent Submissions

  • De Silva, R [Conference-Full-text]
  • Nawaratne, BKUR; Perera, JLPR; Perera, KDC; Perera, WPRM; Mangaleswaran, C [Conference-Full-text]
    This paper discusses what Ethical Data mining is and how significant it is for the current world. It describes how the information and data available can be used efficiently while ensuring the privacy of the information ...
  • Weerasinghe, BAJN; Weerasinghe, VP; Pirinthapan, M; Nanayakkara, DAU; Perera, LNPT [Conference-Full-text]
    This paper discusses on human mind and computer intelligence. It briefly discusses about the structure of the brain and explores how human brain can interact with machines using Brain Computer Interaction. Then the ...
  • De Silva, HP; Siriwardana, TWRO; Somasiri, RPIT; Surasinghe, SAHB; Surendra, KHA [Conference-Full-text]
    The purpose of this literature review is to provide information about current status of digital divide, explore reasons for digital divide and issues rose on society and provide a summary of initiatives that can be taken ...
  • Chathuranga, RGC; Dassanayaka, DMSR; Jayasekara, WAS; Kannangara, DLS; Wattalaeniya, LPK [Conference-Full-text]
    Time spent by humans, interacting with computer systems to perform day today activities increase with the development of the world. Hence it is useful and important to identify and analyze the factors that affect Human ...
  • Herath, SWHMSP; Gunarathna, UARR; Hettiarachchi, HAC; Herath, HMAB; Wickramanayake, SKK [Conference-Full-text]
    Turning a new chapter in game theory some of its applications to the field of Software Engineering are explored recently. Game theory addresses strategic problems. There are many aspects in software development process ...
  • Liyanagunawardana, AS; Shanika, TGT; Rajagopalasarma, J; Wijenayake, CBA; Wijeweera, BS [Conference-Full-text]
    This paper discuss about short message services and its usages and the dynamical behaviors of the people who use this services. The report starts with an introduction about how the SMS system is working and what are ...
  • Iroshan, AKA; Indrajee, KHH; Mahawithana, P; Dharshana, KUGS; Premarathna, PHSR [Conference-Full-text]
    Cryptography is a concept and a methodology for secret communication, which is used and improved thousands of years. Cryptography includes a vast variety of implementation schemes, starting from simple shifting ciphers to ...
  • Wijesinghe, ASR; Nayanamith, I; Galappaththi, T; de Silva, KL; bandara, P [Conference-Full-text]
    This paper contains current trends in network design and implementation. This is a vast field. So this paper will discussed about this topic in several topics. Mobile industry, World Wide Web, Transition to IPv6 from ...
  • Weerasekara, WMTB; Rajaguru, RMCD; Chandrasena, DHDM; Ranasingha, NMTL; Ponnamperuma, SR [Conference-Full-text]
    The main objective of this research paper is to identify the modern technologies which are used to interact with computing devices and securing those input methods. Here, we mainly focus on modern aspects of the user ...
  • De Silva, PHMP; De Silva, PH; De Vas Gunawardhana, APCJ; Pathirana, PPPS; Senarathna, USM [Conference-Full-text]
    The globalization and the trend towards a knowledge-based economy emphasize the importance of using Information and Communications Technology (ICT) and elearning concepts in education. Currently many countries trying ...
  • Murugamoorthy, M; Panditha, A; Pathiranage, ADLV; Sandamal, LC; Weerasinghe, PSL; Wijesiri, TIII [Conference-Full-text]
    This paper provides an analysis of the current status in enabling distance learning via web highlights its limitations and problems.
  • Abeyweera, AL; Amarasinghe, GN; De Silva, MDH; Jenanamhan, Y; Rathnayake, RMS [Conference-Full-text]
    Apple is more than just an induct they are innovators at their very core. They don't modified their technology or the technology of their competitors they invent technology. The apple products are sleek, stylish and are ...
  • Abeywickrama, HV; Dahanaykage, TPK; Dissanayakage, DMA; Ganegedara, KMTV; Ranawaka, RAU [Conference-Full-text]
    Language undoubtedly is one of the most effective communication methods invented ever. But the difference between the languages used in different parts of the world has negatively affected the rapid development ...
  • Ariyarathna, AL; Dharmasiri, DDC; Jayendranath, HRR; Jayarathna, MSH; Perera, WPM [Conference-Full-text]
    With the invention of mobile web, World Wide Web is no longer limited to our desktops. The challenge is obviously to come up with web designs that would support web applications via mobile web browsing as well as personal ...
  • Gurutharsan, N; Hareesan, R; Kanarupan, K; Rajkumar, R; Sathiyavarthan, S [Conference-Full-text]
    Information is in many forms and it is everywhere. Information is to be exchanged. At present communication systems are well developed and widely used There arise the issues regarding the Security Measurements The ...
  • Kumara, MH; Kuruppu, KAMMN; Kumara, LAJ; Mapa, EB; Mannapperuma, DS [Conference-Full-text]
    Poverty is a burning problem BOP societies. Since agriculture is the main occupation in most of rural areas, agricultural production and post-harvest activities mainly counted as their income which their lives will ...
  • Dassanayake, DMUC; De Silva, LYSG; Fernando, MDY; Jayawardana, DDSL; Ranatunga, AI [Conference-Full-text]
    parallel computing is one of the main solutions for the newly arising computational problems, implementations of parallelism are multi-core systems. To improve the performance in specific usage such as matrix multiplication ...
  • Anicitus, PDDA; Dissanayake, MDAS; Jayawardena, SS; Lakjeewa, DM; Basnagoda, SNR [Conference-Full-text]
    The evolutionary development of Information and Communication Technology has become a doubled edge knife since it has made human life console and easy, and at the same time unsafe and vulnerable. In this paper we have put ...
  • Adhikarinayake, CK; Baddegama, VW; Bandara, GM; Erabadda, ELBH; Senarathna, MSR [Conference-Full-text]
    ConP^rs have replaced majority of file based systems. File shareing has become essntional for any company and for any individual with incerasing usuage of technology. systems to be successful. In this paper we have discussed ...