Work place: Department of Electrical and Electronic Engineering, Faculty of Engineering, University of Peradeniya, Sri Lanka
E-mail: maheshid@eng.pdn.ac.lk
Website: https://orcid.org/0000-0001-5209-5441
Research Interests: Computer systems and computational processes, Computational Learning Theory, Image Compression, Image Manipulation, Image Processing, Medical Image Computing
Biography
Maheshi Buddhinee Dissanayake received the B.Sc. Engineering degree with First Class Honors in electrical and electronic engineering from the University of Peradeniya, Sri Lanka, in 2006, and the Ph.D. in electronic engineering from the University of Surrey, U.K., in 2010. Since 2013, she has been a Senior Lecturer with the Department of Electrical and Electronic Engineering, Faculty of Engineering, University of Peradeniya. She has been a visiting research fellow at King's College London from 2015-2017. Her research interests include error correction codes, robust video communication, molecular communication, machine learning, and biomedical image analysis. She has co-authored nearly 75 conference and journal articles and has a citation record of more than 200. Dr. Dissanayake is a Senior Member of Institute of Electrical and Electronics Engineers (IEEE) and Associate member of Institution of Engineers, Sri Lanka (IESL). She has served as an organizing committee member and TPC Member of many IEEE conferences, and as a reviewer in IEEE journals in the area of Molecular communication and image processing. At present she is the Chairperson of IEEE Sri Lanka Section, and the founder as well as the immediate past Chair of IEEE Women in Engineering Sri Lanka section.
By Sehan Samarakoon Maheshi B. Dissanayake Kithsiri M Liyanage Sudheera Navaratne Chirantha Jayasinghe Prabhath Illangakoon
DOI: https://doi.org/10.5815/ijcnis.2024.05.07, Pub. Date: 8 Oct. 2024
A fundamental and vital aspect of Smart Metering infrastructure is the communication technologies and techniques associated with it, especially between the Smart Meters and the Data Concentrator Unit. Among many available communication technologies, ZigBee provides a low-cost, low-power, and easy-to-deploy network solution for a Smart Meter network. There exists limited literature that discusses ZigBee as a potential communication technology for long-range networks. Hence thorough analysis is demanded on the suitability of ZigBee for smart meter deployment under different types of environmental conditions, coverage ranges, and obstacles. This work evaluates the performance of an extended ZigBee module in outdoor as well as indoor conditions in the presence of different types of obstacles. Parameters are obtained for path loss exponent and the standard deviation of the Gaussian Random variable to validate the Log Normal Shadowing model for modeling long-range ZigBee communication. The impact of obstacles on path loss is also considered. The results show that the Log Normal Shadowing model is a good approximation for the behavior of ZigBee path loss. Accordingly, the suitability of ZigBee for a Smart Meter network spanned as a Neighborhood Area Network is also assessed based on the approximated model.
[...] Read more.By Sithmini Gunasekara Dilshan Gunarathna Maheshi B. Dissanayake Supavadee Aramith Wazir Muhammad
DOI: https://doi.org/10.5815/ijigsp.2022.06.06, Pub. Date: 8 Dec. 2022
Deep learning (DL) architectures are becoming increasingly popular in modern traffic systems and self-driven vehicles owing to their high efficiency and accuracy. Emerging technological advancements and the availability of large databases have made a favorable impact on such improvements. In this study, we present a traffic sign recognition system based on novel DL architectures, trained and tested on a locally collected traffic sign database. Our approach includes two stages; traffic sign identification from live video feed, and classification of each sign. The sign identification model was implemented with YOLO architecture and the classification model was implemented with Xception architecture. The input video feed for these models were collected using dashboard camera recordings. The classification model has been trained with the German Traffic Sign Recognition Benchmark dataset as well for comparison. Final accuracy of classification for the local dataset was 96.05% while the standard dataset has given an accuracy of 92.11%. The final model is a combination of the detection and classification algorithms and it is able to successfully detect and classify traffic signs from an input video feed within an average detection time of 4.5fps
[...] Read more.DOI: https://doi.org/10.5815/ijwmt.2021.06.05, Pub. Date: 8 Dec. 2021
Internet of Things (IoT) consists of group of devices which communicates information over private networks. One of the key challenges faced by IoT networks is the security breaches. With the objective of automating the detection of possible security breaches in five categories, IoT traffic created with Message Queue Telemetry Transport (MQTT) protocol is analyzed. The five categories of cyber-attacks considered are brute force, denial of service (DoS), flooding, malformed data, and SlowITe attacks along with legitimate traffic. The popular five machine learning (ML) models, LightGBM, Random Forest, MLP, AdaBoost, and Decision Tree Classifiers are trained to predict cyber-attacks. In traditional traffic analysis all the available features of MQTT traffic were utilized for the ML modeling and in this work, we challenge the practice by showing that automated feature selection improves the performance of the overall ML models. The average accuracy, precision, recall and the F1 score are used as performance evaluation metrics. It is observed that all models in average are able to achieve 90% of accuracy in classification, while MLP model is trained 10 times faster than the other models. Further the optimal number of features for correct classification is identified as 10 features through Monte Carlo analysis. With the reduced features, it is possible to detect DoS, flooding, and SlowITe attacks with more than 90% accuracy and precision. Yet, it is difficult to tell apart brute force and malformed data attacks.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals