Chaminda Hewage
YOU?
Author Swipe
View article: Biomimetic Robotics and Sensing for Healthcare Applications and Rehabilitation: A Systematic Review
Biomimetic Robotics and Sensing for Healthcare Applications and Rehabilitation: A Systematic Review Open
Biomimetic robotics and sensor technologies are reshaping the landscape of healthcare and rehabilitation. Despite significant progress across various domains, many areas within healthcare still demand further bio-inspired innovations. To a…
View article: Spectro-Image Analysis with Vision Graph Neural Networks and Contrastive Learning for Parkinson’s Disease Detection
Spectro-Image Analysis with Vision Graph Neural Networks and Contrastive Learning for Parkinson’s Disease Detection Open
This study presents a novel framework that integrates Vision Graph Neural Networks (ViGs) with supervised contrastive learning for enhanced spectro-temporal image analysis of speech signals in Parkinson’s disease (PD) detection. The approa…
View article: Where is the ‘New’? Teachers’ perceptions of the opportunities and challenges for the Expressive Arts AoLE in the Curriculum for Wales (2022)
Where is the ‘New’? Teachers’ perceptions of the opportunities and challenges for the Expressive Arts AoLE in the Curriculum for Wales (2022) Open
The new Curriculum for Wales officially began its national roll-out in September 2022 after a five-year period of consultation and co-construction. This ambitious educational reform is underpinned by a philosophy of pedagogic flexibility a…
View article: The Evolutions of Reflectarray Antennas for Small Satellites: Navigating to Design, Fabrication, and Performance Techniques
The Evolutions of Reflectarray Antennas for Small Satellites: Navigating to Design, Fabrication, and Performance Techniques Open
Classical antennas in small satellites such as reflectors and phased arrays have encountered significant challenges, including restricted beam steering capabilities and complex deployment mechanisms. Reflectarray antennas have emerged as a…
View article: Editorial: Cyber security in the wake of fourth industrial revolution: opportunities and challenges
Editorial: Cyber security in the wake of fourth industrial revolution: opportunities and challenges Open
EDITORIAL article Front. Big Data, 21 February 2024Sec. Cybersecurity and Privacy Volume 7 - 2024 | https://doi.org/10.3389/fdata.2024.1369159
View article: Machine-Learning-Based Spam Mail Detector
Machine-Learning-Based Spam Mail Detector Open
The proliferation of spam emails, a predominant form of online harassment, has elevated the significance of email in daily life. As a consequence, a substantial portion of individuals remain vulnerable to fraudulent activities. Despite Gma…
View article: Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom
Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom Open
The emergence of Industry 5.0 has revolutionized technology by integrating physical systems with digital networks. These advancements have also led to an increase in cyber threats, posing significant risks, particularly for small and mediu…
View article: Perspective of small and medium enterprise (SME's) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales
Perspective of small and medium enterprise (SME's) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales Open
Small and medium enterprises (SMEs) have adapted their working methods in response to cyber threats, including security checks on internet-connected devices and securing social media accounts. To safeguard their data, SMEs are increasingly…
View article: Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems
Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems Open
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based soluti…
View article: The Journey to Making ‘Digital Technology’ Education a Community Learning Venture
The Journey to Making ‘Digital Technology’ Education a Community Learning Venture Open
Technology has become an integral part of our educational systems, and its importance in our schools cannot be overstated. However, digital skills, unlike other literacy skills, such as reading, writing, and numeracy, still have many disco…
View article: Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System
Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System Open
Software security vulnerabilities are significant for the software development industry. Exploration is conducted for software development industry landscape, software development eco-system landscape, and software system customer landscap…
View article: Convergence of Artificial Intelligence and Neuroscience towards the Diagnosis of Neurological Disorders—A Scoping Review
Convergence of Artificial Intelligence and Neuroscience towards the Diagnosis of Neurological Disorders—A Scoping Review Open
Artificial intelligence (AI) is a field of computer science that deals with the simulation of human intelligence using machines so that such machines gain problem-solving and decision-making capabilities similar to that of the human brain.…
View article: The Advents of Ubiquitous Computing in the Development of Smart Cities—A Review on the Internet of Things (IoT)
The Advents of Ubiquitous Computing in the Development of Smart Cities—A Review on the Internet of Things (IoT) Open
By leveraging ubiquitous computing and the Internet of Things (IoT), smart cities gain potential to provide a wider range of services. Different homogeneous and heterogeneous networking schemes and applications have been proposed in the li…
View article: A Survey on Optimization Techniques for Edge Artificial Intelligence (AI)
A Survey on Optimization Techniques for Edge Artificial Intelligence (AI) Open
Artificial Intelligence (Al) models are being produced and used to solve a variety of current and future business and technical problems. Therefore, AI model engineering processes, platforms, and products are acquiring special significance…
View article: Detection and Minimization of Malware by Implementing AI in SMEs
Detection and Minimization of Malware by Implementing AI in SMEs Open
The malware can threaten personal privacy by opening backdoors for attackers to access user passwords, IP addresses, banking information, and other personal data, whilst some malware extracts personal data and sends them to people unknown …
View article: Data Protection in a Post-Pandemic Society
Data Protection in a Post-Pandemic Society Open
This book discusses key issues and challenges associated with personal data protection prior, during and post COVID-19 pandemic.
View article: Mathematical Modeling and Validation of Retransmission-Based Mutant MQTT for Improving Quality of Service in Developing Smart Cities
Mathematical Modeling and Validation of Retransmission-Based Mutant MQTT for Improving Quality of Service in Developing Smart Cities Open
Unreliable networks often use excess bandwidth for data integration in smart cities. For this purpose, Messaging Queuing Telemetry Transport (MQTT) with a certain quality of service (QoS) is employed. Data integrity and data security are f…
View article: Malware - Detection and Defense
Malware - Detection and Defense Open
Cyber security providers are facing a continuous stream of new, sophisticated cyberattacks on cyber critical infrastructures worldwide. These cyberattacks are often triggered by malware and ransomware. This book presents a collection of se…
View article: Public service operational efficiency and blockchain – A case study of Companies House, UK
Public service operational efficiency and blockchain – A case study of Companies House, UK Open
Despite the increasing interest and exploration of the use of blockchain technology in public service organisations (PSOs), academic understanding of its transformative impact on the operational excellence of PSOs remains limited. This stu…
View article: In-Vehicle Communication Cyber Security: Challenges and Solutions
In-Vehicle Communication Cyber Security: Challenges and Solutions Open
In-vehicle communication has become an integral part of today’s driving environment considering the growing add-ons of sensor-centric communication and computing devices inside a vehicle for a range of purposes including vehicle monitoring…
View article: The Normative Power of the GDPR: A Case Study of Data Protection Laws of South Asian Countries
The Normative Power of the GDPR: A Case Study of Data Protection Laws of South Asian Countries Open
The increased dependency on technology brings national security to the forefront of concerns of the 21st century. It creates many challenges to developing and developed nations in their effort to counter cyber threats and adds to the inher…
View article: Deep Neural Network Based Real-Time Intrusion Detection System
Deep Neural Network Based Real-Time Intrusion Detection System Open
In recent years, due to the rapid growth in network technology, numerous types of intrusions have been uncovered that differ from the existing ones, and the conventional firewalls with specific rule sets and policies are incapable of ident…
View article: Threat Modelling of Cyber Physical Systems: A Real Case Study Based on Window Cleaning Business
Threat Modelling of Cyber Physical Systems: A Real Case Study Based on Window Cleaning Business Open
Threat modelling Cyber-Physical System built on cloud infrastructure to monitor and manage the window cleaning operation using Window Cleaning Warehouse as a case study. Focusing on IoT data collection and cloud infrastructure security and…
View article: Cybersecurity, Data Privacy and Blockchain: A Review
Cybersecurity, Data Privacy and Blockchain: A Review Open
In this paper, we identify and review key challenges to bridge the knowledge-gap between SME’s, companies, organisations, businesses, government institutions and the general public in adopting, promoting and utilising Blockchain technology…
View article: Measuring, Modeling and Integrating Time-Varying Video Quality in End-to-End Multimedia Service Delivery: A Review and Open Challenges
Measuring, Modeling and Integrating Time-Varying Video Quality in End-to-End Multimedia Service Delivery: A Review and Open Challenges Open
The multimedia delivery chain consists of multiple stages such as content preparation, content delivery via Over-The-Top delivery network and Internet Service Providers network. Within the multimedia service chain, each stage influences th…
View article: Cost Benefits of Using Machine Learning Features in NIDS for Cyber Security in UK Small Medium Enterprises (SME)
Cost Benefits of Using Machine Learning Features in NIDS for Cyber Security in UK Small Medium Enterprises (SME) Open
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unp…
View article: Preventing Spoliation of Evidence with Blockchain: A Perspective from\n South Asia
Preventing Spoliation of Evidence with Blockchain: A Perspective from\n South Asia Open
Evidence destruction and tempering is a time-tested tactic to protect the\npowerful perpetrators, criminals, and corrupt officials. Countries where law\nenforcing institutions and judicial system can be comprised, and evidence\ndestroyed o…
View article: IoT Technologies during and Beyond COVID-19: A Comprehensive Review
IoT Technologies during and Beyond COVID-19: A Comprehensive Review Open
The COVID-19 pandemic provided a much-needed sanity check for IoT-inspired frameworks and solutions. IoT solutions such as remote health monitoring and contact tracing provided support for authorities to successfully manage the spread of t…