Digital Repository

Browsing BEng (Hons) Software Engineering by Title

Browsing BEng (Hons) Software Engineering by Title

Sort by: Order: Results:

  • Mohamed Mursheed, Fathima Zuha (2022)
    "With the increased use of digital screens for work and study, the typical person is being exposed to more digital screens, which can be damaging to the eyes and psychologically if the necessary steps are not taken to ...
  • Jayakaduwa, Dilini (2024)
    "The primary issue is on the vital requirement for a precise, effective, and easily available diagnosis of strabismus, a condition marked by ocular misalignment that affects vision, depth perception, and may result in ...
  • Gunasekara, Kavindi (2023)
    "The face image manipulation detection system proposed in this research combines deep learning and computer vision methods to produce accurate and dependable findings. The system begins by extracting different features from ...
  • Gangabadage, Apeksha Rathnamali (2022)
    In this time of the COVID-19 pandemic, it is very important to know whether people living in an area use safe equipment or not so that no one is affected by the disease. There are certain strict rules that need to be ...
  • Rajagalgoda Gamage, Samadhi (2023)
    "The Face Recognition Attendance System project intends to use facial recognition to automate the attendance process in online classes. The time-consuming and error-prone manual arrival method, which can result in ...
  • Lakminda, N.Y.N.M (2017)
    Automated Teller Machines (ATM) are meant to operate alone without a security personnel from the corresponding financial institute. Therefore the security of ATMs should be at a high level. Even though ATMs possess significant ...
  • Parameswaran, Abishan (2023)
    "Emotions are a fundamental aspect of the human experience, and poetry has long been used as a means of expressing and exploring these emotions. However, not everyone is comfortable with or skilled at expressing their ...
  • Kaizar, Abdul Qadir (2020)
    Security is something everyone wants and needs in this technologically evolving world. Banks especially where the most precious item in our life, money is kept, requires the best security. ATMs nowadays are a common utility ...
  • Demuni, Daham (2025)
    With the increasing reliance on Large Language Models (LLMs) for academic research, students are often exposed to biased or unfair information without realizing it. This presents a critical problem as educational content ...
  • Bogoda, Miyuru (, 2023)
    "This is an era of technological advancement, and nowadays every human being prefers to use the internet to access news and to get updates about their day-to-day lives and the world's news. Using the internet is easy and ...
  • Uvais, A.M (2021)
    " The internet has become a primary source of information for most of its users. While this may come with its advantages and disadvantages. One such disadvantage is the existence of false news or Fake news. While ...
  • Nawaz, Aarthif (2022)
    "Fashion designers encounter a lot of difficulties when crafting and designing in-vogue fashion designs. As a result, many fashion-design productions don’t come large-scale to the market and are below standard. These ...
  • Bombuwala, Gayashan (2019)
    Generating photorealistic images holds great value to many applications. Several interesting examples could be visualizing how a newly designed dress looks on people in different poses, manipulating a specific character’s ...
  • Kodituwakku, Hirun (2023)
    "FaaS is an emerging cloud computing paradigm that enables consumers to deploy and execute tasks as individual functions. The service provider manages the management of functions such as resource allocation and scaling, ...
  • Mohammed, Shamly (2023)
    "Research on road pothole detection has been ongoing for the past two decades, with signif icant progress made in the domain of semantic segmentation for detecting potholes. However, such approaches require a large ...
  • Karawita, Mandeera (2018)
    Digital security requests significantly more consideration and keeping in mind that ensuring basic data framework tends to a significant part of the issue, all the more should be finished. As business security and ...
  • Akalpa, Pasindu (2024)
    "One of the limitations of the current search functionalities embedded into existing operating system file explorers is that they are restricted to metadata-based searches, such as file names and creation dates. This means ...
  • Fernando, W. K. Minolie (2018)
    Venue is the one of the most important factors in organizing an event. It has the biggest impact to the budget of any event. Requirements for events differ from each other. In Sri Lanka, there is a lack of a proper online ...
  • Fernando, Sumudu (2023)
    "With its vast amounts and wide variety of information, the World Wide Web has become one of the richest and most widely available information sources in the current information-driven society. With the advancements in ...
  • Muthunayaka, Geeth (2025)
    In recent years, text-to-image generation has gained a lot of attention. Diffusion models have been proven to be the state-of-the-art in this domain. However, due to their high computational demands, most of the current ...

Search


Advanced Search

Browse

My Account