SLIIT >

Browsing by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 245 to 264 of 343
< previous   next >
Issue DateTitleAuthor(s)
6-Apr-2016The Real-time Virtual Fitting Room: VFITDawndasekare, D.M.S.P.K; Subhasinghe, V.S.C.; Hemendra, K.H.S.; Niroshika, Aruni; Anuradha, P.K.
2017A Reinforcement Learning Approach To Enhance The Trust Level of MANETsJinarajadasa, Gihani; Jayantha, Wayomi; Wijerathne, Sammani; Jayasinghe, Gothami; Rupasinghe, Lakmal
6-Apr-2016Relationship between Audit Committee Characteristics and Earnings Management in Sri Lanka (2013-2015)Kankanamge, C.A.
Jan-2013Reliable Power Saved Communication Environment for MANETShanthi, R.V.; Wanniarachchi, P.G.; Keerthirathna, S. N. P.; Sambbavi, P.; Jayakody, A.C.; Rupasinghe, P.L.
11-Jul-2013Reliable Power Saved Communication Environment for MANETShanthi, R. V.; Wanniarachchi, P. G.; Keerthirathna, S. N. P.; Sambbavi, P.; Jayakody, A. C.; Rupasinghe, P. L.
2017Review & Analyze Chat Messages of the Chatting PartnerDinesh Lakmal, E; Cooray, B.S.U.M; Theekshana, M.A.H; Harischandra, K.P.I.E; Kasthurirathna, Dharshana
Dec-2014“The Rhythm of Silence” - Gesture Based Intercommunication Platform for Hearing-impaired People (Nihanda Ridma)Kulaveerasingam, N.; Wellage, S.; Samarawickrama, H.M.P.; Perera, W.M.C.; Yasas, J.
26-Sep-2014A Risk Management Framework in the Cloud using Big Data and Security Informatics - An Application of Attack Tree for Analysis of Social Media NetworksSubasinghe, K.D.B.H; Kodithuwakku, S.R.; Perera, H.S.C.
2017Road Rule Violation Detection SystemUluwaduge, H. R. I.; Samali, H. K. N.; Pethumi Nimasha, D.; Madushanka, D. M. J. T.; Walgampaya, Namalie
26-Sep-2014Role of Change Management in Information System Implementations: Case of Custom Designed Information System Implementations in Sri LankaWeerasinghe, A.H.; Nanayakkara, S.K.L.; Dissanayake, D.M.A.E.K.; Perera, S. A.S.A.; Abeysiri, L.; Suraweera, T.
6-Apr-2016Role of Smartphones on Improving Quality of LifeDinesh, T.; Saraniya, D.
2016SecAODV: Lightweight Authentication for AODV ProtocolJayakody, J.A.D.C.A.; Samarasinghe, R.; Kodituwakku, S.R.
Jan-2013Secured Mail through PGP Mail GatewayHaturusinha, L.S.; Landersz, Y.Y.; Gamage, A. U. H.; Pathiranage, P.N.; Rodrigo, G.T.D.; Gamage, M. P. A. W
11-Jul-2013Secured Mail through PGP Mail GatewayHaturusinha, L.S.; Landersz, Y.Y.; Gamage, A.U.H.; Pathiranage, P.N.; Rodrigo, G.T.D.; Gamage, M. P. A. W.
Dec-2014SECURED, RELIABLE, LOW POWER COMSUMPTION Ad – HOC ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSSilva, W.M.S.S; Ashani, U.G.I; Dinushka, K.C.; Jayakody, A.; Mahaadikara, H.
2017SELF-LEARNING GAME AI ASSISTANTMohottige, A.E; Wijesinghe, A.G.B.S.; Fonseka, S.N.; Perera, H.R.L.; Kasthurirathna, Dharshana
2017Self-Speech Evaluation with Speech Recognition and Gesture AnalysisShangavi, S.; Jeyamaalmarukan, S.; Jathevan, A.; Umatharsini, M.; Samarasinghe, Pradeepa
2016Semantic Information Retrieval from research papers Based on Ontology and SPARQL Query: Research paper optimizerAbeyrathne, L.; Lankage, M.; Darshanamali, C.; Wickramarachchi, D.; koggalahewa, D.
Dec-2009Semantic Knowledge Transfer AgentBandara, I.M.H.J; Dahanayake, N.B.A.; Samaratunge, S.A.U.S.; Karunanayake, C.A.; Jayasinghe, J.A.C.N.; Kodagoda, N.
Jan-2012SENTENTIA – Proximate Collaboration and Multicasting with Augmented IdentificationJayasinghe, L.S.; Kalansuriya, P.G.; Ranasinghe, T.D.; Vithana, L.K.; Thelijjagoda, S.
Showing results 245 to 264 of 343
< previous   next >

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback