Writer identification, a crucial task in forensic analysis and historical document authentication. faces significant challenges with data scarcity and cross-lingual application Existing systems struggle when confronted ...
Accurately predicting bug fix times within software projects remains a crucial yet elusive task. While existing research has explored bug prediction, the specific domain of predicting bug fix times on GitHub using machine ...
This research addressed the urgent issue of online safety by developing a system to detect and classify Sinhala adult-only textual content using NLP and ML. Given the increasing presence of inappropriate content in Sinhala ...
The rise of clickbait on YouTube undermines user trust and platform credibility by using misleading titles and thumbnails. Current detection methods, which focus mainly on text or engagement metrics, fall short in addressing ...
"Sri Lanka faces a growing concern regarding mental health, with rising rates of depression and suicidal ideation. Traditional methods of detecting such conditions often rely on clinical settings or self-reported data, ...
Problem: Retailers capture extensive products and store sales data but still manually group stores and design planograms for shelf space, relying on subjective, outdated methods. These department-by-department processes ...
Accurately predicting financial distress is essential for managing risk and ensuring stability in financial markets, particularly those of developing economies, where external factors could greatly influence corporate ...
This research addresses the integration of Robotic Process Automation (RPA) and
Machine Learning (ML) to enhance the efficiency and accuracy of document
processing in various business environments. The study identifies ...
With the increase in online financial transactions, the risk of fraud involving credit cards has grown many-fold. Most fraud detection systems that exist are designed to either stress speed or accuracy but hardly achieve ...
Problem: Large Language Models (LLMs) such as GPT have revolutionised digital
applications but remain vulnerable to ""jailbreak prompts"" that bypass safety mechanisms,
potentially causing harmful outputs. Existing ...
Tools and technologies for mental health screening in existing literature either sacrifice
conversational capability over diagnosis accuracy or vice versa. Moreover, both have tradeoffs
between computing resources and ...
Problem: Mental stress significantly affects physical and mental health, leading to decreased productivity and long-term health issues. Traditional detection methods, such as physiological monitoring and self-reporting, ...
Remote work provides flexibility, but it also magnifies concerns about employee well-being in terms of emotional instability, stress, and mental health. The traditional way of monitoring
mental health and performance ...
Text-to-SQL is an efficient way to generate SQL queries and retrieve data from databases using human natural language. This approach helps non-technical users in different domains such as education, healthcare, and finance ...
Mahagama Kamkanamge, Sahan Thinusha Wijayananda(2025)
Problem: Monitoring microservices in an environment with many interactions between
services and a tremendous amount of log data can be a challenge. The traditional methods have
the difficulty of finding new or subtle ...
The progression of cloud computing technologies in the recent years increased its usage and involvement in application deployment. Kubernetes framework provides resilient deployment strategies for distributed systems by ...
Research in Anomalous Sound Detection (ASD) in industrial machines is a vital area of
research aimed at improving operational efficiency, ensuring safety, and optimizing
maintenance practices. This study leverages advanced ...
Problem: With the involvement of data science and Internet of Things (IoT) technologies, smart home systems have undergone significant improvements. While existing smart home systems demonstrate satisfactory performance, ...
Cross-border payments play a crucial role in facilitating global trade, remittances, and financial
transactions. However, traditional systems, such as SWIFT and correspondent banking
networks, face significant challenges ...
Fraudulent attendance manipulation threatens academic integrity, compliance, and resource use in
schools and businesses. Traditional systems like sign-ins, RFID, and basic biometrics are
vulnerable to proxy sign-ins, ...