Saluka Ranasinghe Kodituwakku

Saluka Ranasinghe Kodituwakku
  • B.Sc., M.Sc., PhD
  • Professor at University of Peradeniya

About

83
Publications
89,883
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
738
Citations
Introduction
I serve as an academic staff member of the University of Peradeniya. In 1993, I joined as a probationary lecturer and promoted to a senior lecturer in 2004. I was promoted to the grade of an associate professor in 2008 and appointed to the Grade of Professor of Statistics and Computer Science in 2013. I have also served as the Head of the Department from 2007-2013 and 2015 to 2016. Currently I serve as the Dean of the Faculty of Science .
Current institution
University of Peradeniya
Current position
  • Professor
Additional affiliations
May 1993 - May 2016
University of Peradeniya
Position
  • Professor of Statistics and Computer Science
September 2008 - March 2013
University of Peradeniya
Position
  • Professor (Associate)
October 2004 - September 2008
University of Peradeniya
Position
  • Professor (Associate)

Publications

Publications (83)
Conference Paper
Full-text available
Research and development (R&D) leading to improvements in the commercial agriculture sector (CAS) is envisaged as a strategy to achieve the specific targets set forth under the second Sustainable Development Goal: ‘Zero-Hunger’. Identification and understanding of the key issues of performance management in R&D and how could they be tackled sensibl...
Article
Strategies redefined and then applied in the process of a research study determine primarily the quality of data/information gathered, and finally, the overall success of that research. This research aims to develop a qualitative study protocol that warrants online-based methodologies to be effectively used for obtaining information from knowledge-...
Article
Full-text available
Research in commercial agriculture is instrumental to achieve the targets set under the second Sustainable Development Goal (SDG), i.e., 'Zero Hunger by 2030.' Execution of research for the success of commercial agriculture becomes a tedious task and research organizations have been long struggling to assess their performance unequivocally in the f...
Article
Execution of a well-defined program of research targeting the commercial agriculture sector could be considered as a strategic change towards keeping a country on the track of achieving the second sustainable development goal (SDG), i.e. ‘zero hunger by 2030’. To make this a reality, analyzing of drawbacks of the present research environment and fi...
Conference Paper
Full-text available
University timetable management is a complex task due to the availability of a large number of constraints. Allocation of lecture theaters and laboratories are carried out by considering the availability of lecturers, seating capacity of venues and subject combinations of students. These factors are difficult to handle with genetic algorithms to pr...
Article
Full-text available
The convex hull of a planer set of points can be defined as the set of vertices of the smallest convex polygon containing all the points. If S is a planer set of points then convex layers of S can be derived by iteratively computing the convex hull of S and then removing it from S. Computation of the convex layers has widely been studied in the sta...
Article
Full-text available
Computing the area of an arbitrary polygon is a popular problem in pure mathematics. The two methods used are Shoelace Method (SM) and Orthogonal Trapezoids Method (OTM). In OTM, the polygon is partitioned into trapezoids by drawing either horizontal or vertical lines through its vertices. The area of each trapezoid is computed and the resultant ar...
Article
Full-text available
Designing an algorithm to deal with a convex shape is easier than that for a concave shape. Efficient algorithms are required to process concave shapes, because every application does not deal with convex shapes. An alternative approach is to first transform a concave shape into a set of convex shapes so that efficient algorithms available for conv...
Article
Full-text available
Polygons can conveniently represent real world objects. In automatic character recognition, shapes of individual letters are represented by polygons. In robotics, obstacles are represented using polygons. In computer graphics programming, solid objects are represented using polygons on the two dimensional screen. The polygons can be easily manipula...
Conference Paper
Full-text available
ABSTRACT: Admitting a child into Grade One of government or private school has become a traumatic and unpleasant event in Sri Lanka. An automated system of web based GIS application will prevent the bias and subjectivity related to Grade One admission to popular schools. Generally, students are admitted to popular schools based on the distance to t...
Article
Full-text available
Line clipping operation is a bottleneck in most of computer graphics applications. There are situations when millions of line segments need to be clipped against convex polyhedrons with millions of facets. An algorithm to clip line segments against a convex polyhedron is proposed in this work. The salient feature of the proposed algorithm is that i...
Article
Full-text available
It is a well-known fact that some criminals follow perpetual methods of operations known as modi operandi. Modus operandi is a commonly used term to describe the habits in committing crimes. These modi operandi are used in relating criminals to crimes for which the suspects have not yet been recognized. This paper presents the design, implementatio...
Article
Full-text available
Finding of the region visible to a given point inside a polygon is an important mathematical problem. Converting a mathematical problem into a computerized algorithm is not straightforward. Such algorithms should be able to address the issues like precision error, indeterminate forms and special cases. In addition, computational cost is also a majo...
Article
Full-text available
Poles of Inaccessibility (PIA) is a popular problem in geographical information systems. The PIA can be defined as the most difficult point to reach within a landmass. That means it is the point furthest from any coastline. If the landmass is represented using a polygon then the PIA of landmass is identical to the center of the largest circle insid...
Conference Paper
A novel concept on risk identification of social media networks using Hidden Markov Models (HMMs) based on behavioural usage patterns is proposed. Unauthorized users are identified based on characteristic activity sequences. Here, a user behavioural model is built for the social media network clients using their detailed activity logs comprising of...
Conference Paper
Controlling the complexity of software applications is an essential part of the software development process as it directly affects maintenance activities such as reusability, understandability, modifiability and testability. However, as stated by Tom DeMarco “You cannot control what you cannot measure”. Thus, over the years many complexity metrics...
Article
Full-text available
It is a well-known fact that some criminals follow perpetual methods of operations, known as modus operandi (MO) which is commonly used to describe the habits in committing something especially in the context of criminal investigations. These modus operandi are then used in relating criminals to other crimes where the suspect has not yet been recog...
Article
Full-text available
It is a well-known fact that some criminals follow perpetual methods of operations, known as modus operandi (MO) which is commonly used to describe the habits in committing something especially in the context of criminal investigations. These modus operandi are then used in relating criminals to other crimes where the suspect has not yet been recog...
Article
Full-text available
The manual crime recording and investigation systems in police stations all around the world are generating piles of crime documents which make storage and retrieval of reliable crime information extremely difficult as well as inefficient. Furthermore, investigators of central authorities have to manually search through these documents and communic...
Article
Full-text available
The manual crime recording and investigation systems in police stations all around the world are generating piles of crime documents which make storage and retrieval of reliable crime information extremely difficult as well as inefficient. Furthermore, investigators of central authorities have to manually search through these documents and communic...
Conference Paper
Full-text available
Web technology is one of the key areas in information and communication technology to be used as powerful tool in ensuring food security which is one of the main issues in Sri Lanka. Web technology involves in communicating and sharing resources in network of computers all over the world. Main focus of food security is to ensure that all people hav...
Article
Full-text available
Web intelligence can be considered as a subset of Artificial Intelligence. It uses existing data in web to produce new data, knowledge and wisdom to support decision making and new predictions for web users. Artificial Intelligence is ever changing and evolving field of computer science and it is extensively used in wide array of web based business...
Article
Full-text available
Advances in the field of Information Technology make Information Security an inseparable part of life. In order to deal with security, Authentication, access control and auditing play important roles. Among them authentication has become an important first activity to be performed in ensuring security. This paper presents an analysis of the biometr...
Conference Paper
In object-oriented software modeling using the Unified Modeling Language, different aspects of a system are represented by various types of diagrams. UML diagrams represent two different views of a system model. They are static and dynamic views. In this paper we study the dynamic view of Class Diagrams and static view of Sequence Diagrams for chec...
Article
Full-text available
Understanding community structure helps to interpret the role of actors in a social network. Actor has close ties to actors within a community than actors outside of its community. Community structure reveals important information such as central members in communities and bridges members who connect communities. Clustering algorithms like hierarch...
Article
Full-text available
Noise removal from images is an important activity for successful processing of images. The main objective of this research work is to investigate the applicability of soft computing techniques and statistical techniques for noise filtering. This paper presents a novel method for noise filtering in images using a fuzzy based statistical method. Thi...
Conference Paper
Full-text available
This paper presents a statistical analysis in the sociological perspective for the grave crime occurrences from the year 2005 to 2011 in Sri Lanka. Graphical interpretations of the datasets showed some significant occurrences of five major grave crime types which can be listed as House Breaking (HB), Hurt by Knife (HK), Robbery (RB), Theft (TH), Ch...
Article
Full-text available
Identifying patterns in Sinhala characters is a very difficult task because the similarities between the Sinhala characters lie in a very mild extent. Printed documents and hand written character recognition play a major role in many areas like security, defence, business and so forth. However, identifying hand written Sinhala characters is difficu...
Article
Full-text available
Android is becoming a successful mobile operating system (OS) with growing popularity. Most android devices have inbuilt GPS receivers. Although it is very popular in Sri Lanka, coordinate system comes with it is not suited because appropriate coordinate transformation tools tailored to Sri Lanka are not available. This paper presents the developme...
Conference Paper
Full-text available
Tracking of sports motion is a challenging task. This paper presents a comparison of different template matching methods that can be used in such motion tracking applications. Six methods were tested with dynamic and still background conditions. Their performance is analyzed using different video sequences obtained by considering sports such as tab...
Conference Paper
Full-text available
Tracking of sports motion is a challenging task. This paper presents a comparison of different template matching methods that can be used in such motion tracking applications. Six methods were tested with dynamic and still background conditions. Their performance is analyzed using different video sequences obtained by considering sports such as tab...
Article
Full-text available
This study provides insights into the relationship between data mining activities and the customization of the packages offered to tourists by hotels. Data mining provides a method of understanding the needs and habits of the tourists so that hotels can provide targeted value propositions to tourists from different geographies. For the study, ten p...
Article
Full-text available
This paper presents an algorithm for efficient detection of the nearest police station for a specific position(coordinates). The algorithm is based on Geographic Information System (GIS), Geographic Positioning Systems (GPS) and the J48 classification algorithm. In other words, the proposed algorithm is an effective integration of these three. The...
Conference Paper
Full-text available
This paper presents a literature review of current routing protocols used in mobile ad hoc network (MANET). Routing is a most challenging issue in ad hoc network since nodes are mobile and the dynamic nature of the topology. Routing metrics such as shortest path, QoS, power consumption and position location are being used to reduce discovery time a...
Article
Full-text available
Literature shows that there are several ways of generating Latin squares, but there is not enough implementation about Super-symmetric Latin squares. This paper proposes a mathematical algorithm to construct Super-symmetric Latin squares of order 2 ୬ by substituting blocks of order 2 n which has the basic properties of a recursive algorithm. The pr...
Conference Paper
Full-text available
It is observed that law enforcement authorities all around the world lack a good and efficient crime analysis system facilitated by the new advancement of information technology. The globalization and increasing complexity of crime patterns have made the analysis of crime date even difficult. Sri Lanka's police too have been dealing with these diff...
Article
Full-text available
Most of the line clipping algorithms are based on Cohen-Sutherland and Liang-Barsky algorithms. These algorithms involve a lot of calculations. This paper proposes a new line clipping algorithm for 2D space which is more efficient than the existing algorithms. The possible extended algorithm for 3D space is also presented. The algorithm proposed fo...
Article
Full-text available
Tracking of motion in weightlifting is a challenging task. This paper presents a method for tracking Weightlifting bar movement of an athlete. The proposed method uses three different template creation techniques for tracking and applies Wilcoxon Signed rank test to evaluate the results. The method was tested with normally captured data (30fps) and...
Conference Paper
Full-text available
GIS (Geographic Information System) has become one of the widely used technologies in the modern world. GPS (Geographic Positioning Systems) facilitates the users to locate current ground position on digital map; accurately and easily. However GPS and GIS itself are not sufficient to produce useful information. Adopting computer based modern analys...
Article
Full-text available
Disease Intelligence (DI) is based on the acquisition and aggregation of fragmented knowledge of diseases at multiple sources all over the world to provide valuable information to doctors, researchers and information seeking community. Some diseases have their own characteristics changed rapidly at different places of the world and are reported on...
Conference Paper
Full-text available
Car detection is a challenging research area where the appearance has various changes due to different models, poses, scales, lighting conditions, background, occlusion and various image sizes. Amidst these external challenging factors, car side-views have obvious and consistent characteristics in their structure such as wheels, oblique windows and...
Conference Paper
Full-text available
Car detection is a challenging research area where the appearance has various changes due to different models, poses, scales, lighting conditions, background, occlusion and various image sizes. Amidst these external challenging factors, car side-views have obvious and consistent characteristics in their structure such as wheels, oblique windows and...
Article
Full-text available
This paper proposes a new line clipping algorithm for 3D space against a cuboid which is not generated based on Cohen-Sutherland or Liang-Barsky line clipping algorithms. The proposed algorithm is based on a newly proposed simple theory developed using basic mathematical concepts. All most all the 3D line clipping algorithms involve three steps to...
Conference Paper
Full-text available
Many police departments in all over the world lack of fast crime investigation systems. The amount of crimes recorded each year is very high. For example, Sri Lankan police department records around 55,000 grave crimes each year. Not only that, the geographical diversity and the modi operandi diversity of these crime data is very high and the amoun...
Article
Full-text available
This paper proposes a new line clipping algorithm for 3D space against a cuboid which is not generated based on Cohen-Sutherland or Liang-Barsky line clipping algorithms. The proposed algorithm is based on a newly proposed simple theory developed using basic mathematical concepts. All most all the 3D line clipping algorithms involve three steps to...
Article
Full-text available
Many police departments all around the worldlack of good and efficient crime recording and analysis systems.The vast geographical diversity and the complexity of crimepatterns have made the analyzing and recording of crime dataeven difficult. According to the Sri Lankan police department,they face these problems for many years. This paper presents...
Article
Full-text available
Artificial Neural Networks have been gaining popularity as statistical tools since it resolves some disadvantages of conventional regression analysis techniques. This paper describes the implementation issues on designing dynamically changing artificial neural networks which are to be applied for the situations where the Regression Analysis is to b...
Article
Full-text available
Content based Image Retrieval (CBIR) allows automatically extracting target images according to objective visual contents of the image itself. Representation of visual features and similarity match are important issues in CBIR. Colour and texture features are important properties in CBIR systems. In this paper, a combined feature descriptor for CBI...
Article
Full-text available
With the introduction of XML vast amount of XML data is manipulated in Web applications. As a result there is a growing interest in storing XML data in relational databases. There are many proposed heuristic techniques to store complex XML documents in relational databases. These techniques typically define fixed mappings and do not take applicatio...
Article
Full-text available
Texture is one of the important features used in CBIR systems. The methods of characterizing texture fall into two major categories: Statistical and Structural. An experimental comparison of a number of different texture features for content-based image retrieval is presented in this paper. The primary goal is to determine which texture feature or...
Data
Today, computer control systems have achieved a highest position of their applicability through large scale industries to smaller activities such as controlling a movement of an object. Especially many researches are being carried out to develop control systems to automate the movements of vehicles as it is performed by a human being. This paper pr...
Article
Full-text available
In a database management system (DBMS), data are stored and processed whenever necessary. On the other hand in data streams, data are created and processed every millisecond. Due to some characteristics of data streams, processing of them is a challenging task. This paper reviews data streams, their characteristics and the challenges to be faced in...
Article
Full-text available
Shape is one of the important features used in Content Based Image retrieval (CBIR) systems. The shape of the object is a binary image representing the object. They are broadly categorized into two groups: contour-based and region-based shape descriptors. An experimental comparison of a number of different shape features for CBIR is presented in th...
Article
Full-text available
Texture is one of the important features used in CBIR systems. The methods of characterizing texture fall into two major categories: Statistical and Structural. An experimental comparison of a number of different texture features for content-based image retrieval is presented in this paper. The primary goal is to determine which texture feature or...
Article
Full-text available
Handwritten character recognition has been an intensive research for last few decades. Very often even in printed text, adjacent characters tend to touch or connected. This makes the recognition of individual characters more difficult. So the successful recognition of characters heavily depends on the segmentation method used. This paper describes...
Article
Full-text available
Artificial Neural Networks have been gaining popularity as statistical tools since it resolves some disadvantages of conventional regression analysis techniques. This paper describes the implementation issues on designing dynamically changing artificial neural networks which are to be applied for the situations where the Regression Analysis is to b...
Article
Full-text available
Data compression is a common requirement for most of the computerized applications. There are number of data compression algorithms,which are dedicated to compress different data formats. Even for a single data type there are number of different compression algorithms,which use different approaches. This paper examines lossless data compression alg...
Article
Full-text available
The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. This paper presents an object oriented design pattern, Administrator Object, to address the User-Role assignment problem in Role B...
Article
Full-text available
Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework i...
Article
Full-text available
Content based image retrieval (CBIR) systems are used for automatic indexing, searching, retrieving and browsing of image databases. Color is one of the important features used in CBIR systems. An experimental comparison of a number of different color descriptors for content-based image retrieval is presented in this paper. Color histograms, color...
Article
Full-text available
We investigate the problem arising in allocating master and workers in the Master-Worker Paradigm. Although various methods have beenproposed for Master-Worker allocation, optimal allocation is yet to be achieved. This paper proposes an extension to the generic Master-Worker architecture for achieving optimal allocation of masters and workers. The...
Article
Full-text available
Much effort has been made in recognizing both online and off-line characters automatically. Although many approaches have been proposed most of them focus on characters of the English Language. A little attention has been given for Asian languages such as Sinhala and Tamil. This paper observes the existing approaches and presents a new approach for...
Article
Full-text available
With the introduction of the course unit system in the stat universities, students' evaluation process has been transformed into a highly complicated task. In order to evaluate students' results it is required to check several requirements such as number or credits, compulsory courses, prerequisites and minimum grade point average. Additionally thi...
Article
Full-text available
Although design patterns are reusable design elements, existing pattern descriptions focus on specific solutions that are not easily reusable in new designs. This paper introduces a new pattern description method for object oriented design patterns. The description method aims at providing a more general description of patterns so that patterns can...
Article
Although design patterns are reusable design elements, existing pattern descriptions focus on specific solutions that are not easily reusable in new designs. This paper introduces a new pattern description method for object oriented design patterns. The description method aims at providing a more general description of patterns so that patterns can...
Conference Paper
Full-text available
Among many biometric identification methods iris recognition is more attractive due to the unique features of the human eye [1]. There are many proposed algorithms for iris recognition. Although all these methods are based on the properties of the iris, they are subject to some limitations. In this research we attempt to develop an algorithm for ir...
Article
Full-text available
Since the introduction of design patterns, a large number of patterns have been identified and documented. As a result, patterns in the literature relate one another in different ways. Unfortunately, most of these patterns are not properly organized. In applying these patterns in to problems at hand novice designers encounter many difficulties such...
Conference Paper
Full-text available
XML has been widely used as a modeling language in many areas such as multimedia applications, vector graphics and web services. Also XML can be accepted as an essential supporting tool for Object Oriented System Design (OOSD) activities. Unified modeling language (UML) facilitates the designing of object oriented systems. This paper proposes an XM...
Article
Full-text available
Main objective of access control is protecting sensitive resources in a system by allowing users to access the information according to their access rights or privileges. The set of resources are usually static, and an access control policy associated with each resource specifies who is authorized to access the resource. Recently role-based access...
Conference Paper
Full-text available
The main objective of this research is to present a new role based access control (FRBAC) model for database security that provides additional level of security checks by extending an existing RBAC model. The proposed model allows modeling of vague organizational security policies or the access control rules in Multipolicy paradigm, using fuzzy par...
Article
Full-text available
We describe mathematical structures in existing pattern or ganization methods and introduce a new organization method based on those mathematical structures. This method organizes patterns into related groups called pattern categories by structuring them according to mathematical structures. Our method assists users to find a set of patterns that c...
Chapter
Full-text available
Virtual enterprises bring together different companies under one umbrella, and the organizational structure is tailored to the common project rather than reflecting the participating companies’ structure. A virtual organization is also dynamic in nature, as jobs/positions can be created or abolished as the project progresses. Access to information...
Conference Paper
Full-text available
A new public key cryptosystem is proposed, together with signature capabilities. This system based on the invertibility of finite automata. The security of the system rests on the difficulty of finding inverse automatas and of factoring matrix polynomial over Galois field GF(2)

Network

Cited By