<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>Collaborative Research Conference</title>
<link>http://drr.vau.ac.lk/handle/123456789/1990</link>
<description/>
<pubDate>Sun, 05 Apr 2026 20:10:12 GMT</pubDate>
<dc:date>2026-04-05T20:10:12Z</dc:date>
<item>
<title>Flow-Based Ensemble Learning for Intrusion Detection in  Software-Defined Networks</title>
<link>http://drr.vau.ac.lk/handle/123456789/2038</link>
<description>Flow-Based Ensemble Learning for Intrusion Detection in  Software-Defined Networks
Karunarathne, K.M.G.B.C.; Dissanayaka, D.M.H.V.; Senanayake, P.S.R.P.S.; Mayuran, P.; Senthooran, V.
We propose a machine learning-based intrusion detection system for SDN, considering the special vulnerability of the &#13;
centralized control plane. It is trained on a publicly available dataset for SDN network traffic, which includes flow &#13;
attributes such as the number of packets, the number of bytes, the flow duration, and the packet rate. To ensure the &#13;
robustness of the learning process, the dataset is subjected to preprocessing techniques such as class balancing using &#13;
SMOTE, feature scaling, and cross-validation. The proposed IDS model employs supervised learning techniques such &#13;
as Random Forest, XGBoost, Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Multi-Layer Perceptron &#13;
(MLP) for the detection of intrusions. Among these, ensemble-based models such as Random Forest and XGBoost show &#13;
promising results, with an accuracy of 99% for the detection of intrusions in SDNs. All the models show high precision &#13;
and recall, with XGBoost being the best choice in terms of performance and efficiency. From the experimental results, it is &#13;
clear that the proposed model for intrusion detection in SDNs is effective, scalable, and viable for the security of the SDN &#13;
infrastructure without compromising the performance of the network, thus making it suitable for real-time applications.We propose a machine learning-based intrusion detection system for SDN, considering the special vulnerability of the &#13;
centralized control plane. It is trained on a publicly available dataset for SDN network traffic, which includes flow &#13;
attributes such as the number of packets, the number of bytes, the flow duration, and the packet rate. To ensure the &#13;
robustness of the learning process, the dataset is subjected to preprocessing techniques such as class balancing using &#13;
SMOTE, feature scaling, and cross-validation. The proposed IDS model employs supervised learning techniques such &#13;
as Random Forest, XGBoost, Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Multi-Layer Perceptron &#13;
(MLP) for the detection of intrusions. Among these, ensemble-based models such as Random Forest and XGBoost show &#13;
promising results, with an accuracy of 99% for the detection of intrusions in SDNs. All the models show high precision &#13;
and recall, with XGBoost being the best choice in terms of performance and efficiency. From the experimental results, it is &#13;
clear that the proposed model for intrusion detection in SDNs is effective, scalable, and viable for the security of the SDN &#13;
infrastructure without compromising the performance of the network, thus making it suitable for real-time applications.
</description>
<pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://drr.vau.ac.lk/handle/123456789/2038</guid>
<dc:date>2026-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>A YOLOv8 Based Recognition System for Sri Lankan Road Traffic Signs</title>
<link>http://drr.vau.ac.lk/handle/123456789/2037</link>
<description>A YOLOv8 Based Recognition System for Sri Lankan Road Traffic Signs
Praveen, S.G.M.; Nanayakkara, R.S.; Fernando, W.B.D.A.; Jayaweera, A.L.L.
Road traffic signs are crucial for road safety, providing drivers with essential information on speed limits, road conditions, &#13;
and other important instructions. Accurate recognition of these signs is vital in preventing accidents and advancing &#13;
autonomous driving systems. A major limitation in prior studies is the lack of models trained on large, customized datasets &#13;
designed for Sri Lankan Context. This study addresses this gap by constructing a Sri Lankan Road traffic sign dataset and &#13;
training a road traffic sign recognition system based on the You Only Look Once version 8 (YOLOv8) model using this &#13;
dataset. The dataset was curated from images collected across Sri Lanka under diverse lighting and weather conditions, &#13;
annotated, pre-processed, and further expanded through data augmentation. The dataset consists of 6,000 images in &#13;
total spanning across 37 Sri Lankan Road traffic sign classes. The YOLOv8 model trained on this dataset achieved a &#13;
mean Average Precision (mAP) of 91.1% at an IoU threshold of 0.5, with precision above 85% and balanced F1-scores &#13;
above 86%. The model performed robustly across varied conditions, excelling in common signs while showing reduced &#13;
performance for rare or visually similar classes. Overall, this work introduces a large-scale Sri Lankan Road traffic &#13;
sign dataset and a road traffic sign recognition model that demonstrates superior accuracy compared to prior studies, &#13;
highlighting the importance of localized datasets and modern deep learning approaches in improving traffic safety and &#13;
intelligent transportation systems.
</description>
<pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://drr.vau.ac.lk/handle/123456789/2037</guid>
<dc:date>2026-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Edge-AI-Enabled Passenger Tracking for Public Buses with   Face Recognition and GPS</title>
<link>http://drr.vau.ac.lk/handle/123456789/2036</link>
<description>Edge-AI-Enabled Passenger Tracking for Public Buses with   Face Recognition and GPS
Sanjeevan, S.; Caldera, H.P.S.N.; Gimhani, M.M.C.; Mayuran, P.
In many developing countries, the counting of passengers in buses is done manually, resulting in a loss of revenue &#13;
for the transportation companies. This paper proposes an IoT-based tracking system for passengers in buses using &#13;
face recognition technology to count the passengers accurately and compute the fares using the GPS device. The &#13;
proposed system employs ESP32-CAM devices with lightweight neural networks to recognize faces and embed the &#13;
faces at the entry and exit points of the bus. A two-point matching technique using the cosine similarity function &#13;
is used to match the faces at the entry and exit points of the bus to identify the passengers. At the same time, the &#13;
GPS device is used to analyze the waypoints to compute the route taken by the bus, thereby calculating the fares &#13;
accurately. The data is stored in CSV format to operate the device offline and then synchronized with the cloud server &#13;
for session management. The proposed system achieved face recognition accuracy of more than 95% and route &#13;
detection accuracy of more than 90%. The proposed system is feasible for edge-AI-based IoT devices for intelligent &#13;
transportation systems, as the device is reliable and costs only USD 15.
</description>
<pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://drr.vau.ac.lk/handle/123456789/2036</guid>
<dc:date>2026-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Efficient and Interpretable Machine Learning for Encrypted  Malicious Traffic Classification</title>
<link>http://drr.vau.ac.lk/handle/123456789/2035</link>
<description>Efficient and Interpretable Machine Learning for Encrypted  Malicious Traffic Classification
Chamuditha, P.G.L.; Madhuwantha, P.L.G.H.K; Senarathna, P.K.C.; Mayuran, P.; Senthooran, V.
Communications that are encrypted, such as HTTPS, TLS, and VPN, have become popular tools for ensuring privacy; &#13;
yet, they can be used for hiding malicious payloads, making intrusion detection more challenging. This study proposes a &#13;
machine learning framework for the classification of malicious encrypted communications using flow-based and temporal &#13;
characteristics. Public datasets containing network traffic captures were used for testing and validating the framework. &#13;
The benign and malicious flows were converted to flow-based features using Scapy and CICFlowMeter tools. Feature &#13;
importance was used to select the most important features for the framework. Three machine learning models were trained &#13;
and tested using the datasets: Random Forest, XGBoost, and linear Support Vector Machine (SVM). Stratified train/test &#13;
split, cross-validation, and family disjoint were used for testing and validating the models. The Random Forest model &#13;
was found to have achieved nearly perfect accuracy for both training and testing sets, approximately 100%, and a high &#13;
accuracy of approximately 92% using cross-validation. Overfitting was minimal for the Random Forest model, whereas &#13;
XGBoost was found to have overfitting issues and SVM had moderate accuracy, approximately 72%. This study suggests &#13;
that the proposed framework can be used for reliably detecting malicious encrypted communications, including those &#13;
that were not used in the training process. SHAP was used to analyze the explainability of the framework and identify &#13;
the most important flow characteristics that were responsible for the decision-making process. The proposed framework &#13;
is computationally efficient and was tested using real-world datasets, making it suitable for practical applications in &#13;
network security
</description>
<pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://drr.vau.ac.lk/handle/123456789/2035</guid>
<dc:date>2026-01-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
